Sciweavers

420 search results - page 45 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
WORM
2003
15 years 1 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ECAI
2008
Springer
15 years 1 months ago
Intelligent adaptive monitoring for cardiac surveillance
Monitoring patients in intensive care units is a critical task. Simple condition detection is generally insufficient to diagnose a patient and may generate many false alarms to the...
Lucie Callens, Guy Carrault, Marie-Odile Cordier, ...
AAAI
2007
15 years 2 months ago
Hybrid Inference for Sensor Network Localization Using a Mobile Robot
In this paper, we consider a hybrid solution to the sensor network position inference problem, which combines a real-time filtering system with information from a more expensive,...
Dimitri Marinakis, David Meger, Ioannis M. Rekleit...
AAAI
2006
15 years 1 months ago
Mixtures of Predictive Linear Gaussian Models for Nonlinear, Stochastic Dynamical Systems
The Predictive Linear Gaussian model (or PLG) improves upon traditional linear dynamical system models by using a predictive representation of state, which makes consistent parame...
David Wingate, Satinder P. Singh
IJDE
2007
105views more  IJDE 2007»
14 years 11 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka