Sciweavers

2236 search results - page 89 / 448
» Intrusion detection techniques and approaches
Sort
View
SAC
2010
ACM
15 years 4 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
SIGCOMM
2004
ACM
15 years 3 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
EUSFLAT
2007
176views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Modifying the Classic Peak Picking Technique Using a Fuzzy Multi Agent to Have an Accurate P300-based BCI
EEG-based brain computer interface (BCI) provides a new communication channel between the human brain and a computer. The classification of EEG data is an important task in EEG-ba...
Gholamreza Salimi Khorshidi, Ayyoub Jaafari, Ali M...
DATE
2003
IEEE
105views Hardware» more  DATE 2003»
15 years 3 months ago
Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results
In this paper is described a software technique allowing to detect soft errors occurring in processor-based digital architectures. The detection mechanism is based on a set of rul...
B. Nicolescu, Raoul Velazco
ICC
2008
IEEE
15 years 4 months ago
A Two-Stage Sensing Technique for Dynamic Spectrum Access
—Dynamic spectrum access (DSA) is a promising approach for mitigating spectrum scarcity. Underlying DSA is the need for fast and reliable spectrum sensing over a potentially larg...
Ling Luo, Sumit Roy