Sciweavers

2236 search results - page 82 / 448
» Intrusion detection techniques and approaches
Sort
View
ICDCSW
2006
IEEE
15 years 4 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
VLUDS
2010
270views Visualization» more  VLUDS 2010»
14 years 4 months ago
Detection and Identification Techniques for Markers Used in Computer Vision
This paper summarizes and compares techniques for detecting and identifying markers in the context of computer vision. Existing approaches use correlation, digital, or topological...
Johannes Köhler, Alain Pagani, Didier Stricke...
RAID
2010
Springer
14 years 8 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
DFT
1999
IEEE
139views VLSI» more  DFT 1999»
15 years 2 months ago
Soft-Error Detection through Software Fault-Tolerance Techniques
The paper describes a systematic approach for automatically introducing data and code redundancy into an existing program written using a high-level language. The transformations ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
CEC
2007
IEEE
15 years 4 months ago
Solving multimodal problems via multiobjective techniques with Application to phase equilibrium detection
Abstract— For solving multimodal problems by means of evolutionary algorithms, one often resorts to multistarts or niching methods. The latter approach the question: ‘What is e...
Mike Preuss, Günter Rudolph, Feelly Tumakaka