Sciweavers

186 search results - page 22 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 11 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ENVSOFT
2006
122views more  ENVSOFT 2006»
15 years 1 months ago
Automatic identification of oil spills on satellite images
A fully automated system for the identification of possible oil spills present on Synthetic Aperture Radar (SAR) satellite images based on artificial intelligence fuzzy logic has ...
Iphigenia Keramitsoglou, Constantinos Cartalis, Ch...
114
Voted
ACSW
2006
15 years 3 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
147
Voted
SPLC
2007
15 years 3 months ago
Mapping Feature Models onto Component Models to Build Dynamic Software Product Lines
Systems such as adaptative and context–aware ones must adapt themselves to changing requirements at runtime. Modeling and implementing this kind of systems is a difficult opera...
Pablo Trinidad, Antonio Ruiz Cortés, Joaqu&...
IPPS
2007
IEEE
15 years 8 months ago
A Configuration Control Mechanism Based on Concurrency Level for a Reconfigurable Consistency Algorithm
A Reconfigurable Consistency Algorithm (RCA) is an algorithm that guarantees the consistency in Distributed Shared Memory (DSM) Systems. In a RCA, there is a Configuration Control...
Christiane V. Pousa, Luís Fabrício W...