Sciweavers

2236 search results - page 106 / 448
» Intrusion detection techniques and approaches
Sort
View
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
15 years 4 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
PTS
2000
75views Hardware» more  PTS 2000»
14 years 11 months ago
Structural Coverage For LOTOS - a Probe Insertion Technique
Coverage analysis of programs and specifications is a common approach to measure the quality and the adequacy of a test suite. This paper presents a probe insertion technique for m...
Daniel Amyot, Luigi Logrippo
CSL
2010
Springer
14 years 8 months ago
Voice activity detection based on statistical models and machine learning approaches
The voice activity detectors (VADs) based on statistical models have shown impressive performances especially when fairly precise statistical models are employed. Moreover, the ac...
Jong Won Shin, Joon-Hyuk Chang, Nam Soo Kim
ARTCOM
2009
IEEE
15 years 4 months ago
Image Segmentation - A Survey of Soft Computing Approaches
—Soft Computing is an emerging field that consists of complementary elements of fuzzy logic, neural computing and evolutionary computation. Soft computing techniques have found w...
N. Senthilkumaran, R. Rajesh
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...