Sciweavers

2236 search results - page 93 / 448
» Intrusion detection techniques and approaches
Sort
View
ADHOCNOW
2007
Springer
15 years 4 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
15 years 10 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
FIW
2007
14 years 11 months ago
Model Inference Approach for Detecting Feature Interactions in Integrated Systems
Many of the formal techniques are orchestrated for interaction detection in a complex integrated solution of hardware and software components. However, the applicability of these ...
Muzammil Shahbaz, Benoît Parreaux, Francis K...
CCS
2007
ACM
15 years 4 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
JIPS
2010
216views more  JIPS 2010»
14 years 4 months ago
Fingerprint Detection Using Canny Filter and DWT, a New Approach
This paper proposes two new methods to detect the fingerprints of different persons based on one-dimensional and two-dimensional discrete wavelet transformations (DWTs). Recent lit...
Md. Imdadul Islam, Nasima Begum, Mahbubul Alam, M....