Sciweavers

4511 search results - page 604 / 903
» Observation Based System Security
Sort
View
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 4 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
INFOCOM
2011
IEEE
14 years 7 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...
MOBISYS
2008
ACM
15 years 6 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
ICIP
2005
IEEE
16 years 6 months ago
Comparative study: face recognition on unspecific persons using linear subspace methods
Recently many Automatic Face Recognition (AFR) systems were developed for applications with unspecific persons, which is different from conventional pattern recognition problems wh...
Dahua Lin, Shuicheng Yan, Xiaoou Tang
CVPR
2010
IEEE
16 years 17 days ago
Super-Resolution of Range Data in Dynamic Environments Using a Gaussian Framework
We present a flexible method for fusing information from optical and range sensors based on an accelerated highdimensional filtering approach. Our system takes as input a sequen...
Jennifer Dolson, Jongmin Baek, Christian Plagemann...