Sciweavers

1804 search results - page 237 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ANCS
2007
ACM
15 years 2 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
TIP
2008
344views more  TIP 2008»
14 years 10 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
EUC
2007
Springer
15 years 4 months ago
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems
Networked embedded systems present unique challenges for system designers composing distributed applications with dyanmic, real-time, and resilience requirements. We consider the ...
Binoy Ravindran, Edward Curley, Jonathan Stephen A...
71
Voted
ISTA
2004
14 years 11 months ago
Applying Web Service Compositions in Systems Management
: Systems management in any organization depends exclusively on the efforts of a system administrator. Every change in the IT infrastructure landscape requires changes in the syste...
Dimka Karastoyanova
96
Voted
CGA
2005
14 years 10 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...