Sciweavers

2236 search results - page 78 / 448
» Intrusion detection techniques and approaches
Sort
View
ACMSE
2006
ACM
14 years 12 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
JMM2
2008
227views more  JMM2 2008»
14 years 10 months ago
A Robust Circular Fiducial Detection Technique and Real-Time 3D Camera Tracking
In this paper a new marker-based approach is presented for 3D camera pose tracking in indoor Augmented Reality (AR). We propose to combine a circular fiducials detection technique ...
Fakhreddine Ababsa, Malik Mallem
ISPA
2004
Springer
15 years 3 months ago
A Novel Technique for Detecting DDoS Attacks at Its Early Stage
Spoofing source IP addresses is always utilized to perform Distributed Denial-of-Service (DDoS) attacks. Most of current detection and prevention methods against DDoS ignore the i...
Bin Xiao, Wei Chen, Yanxiang He
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
AAAI
2006
14 years 11 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...