Sciweavers

4511 search results - page 624 / 903
» Observation Based System Security
Sort
View
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 9 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 9 months ago
Locational Pricing and Scheduling for an Integrated Energy-Reserve Market
It is well known that given a network that can become constrained on voltage or real power flows, reserves must also be spatially located in order to handle all credible contingen...
Jie Chen, James S. Thorp, Robert J. Thomas, Timoth...
139
Voted
ICASSP
2010
IEEE
15 years 4 months ago
Improved Internet traffic analysis via optimized sampling
Applications to evaluate Internet quality-of-service and increase network security are essential to maintaining reliability and high performance in computer networks. These applic...
Sean McPherson, Antonio Ortega
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 2 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
131
Voted
PTS
2007
120views Hardware» more  PTS 2007»
15 years 5 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König