Sciweavers

288 search results - page 46 / 58
» Performance anomaly of 802.11b
Sort
View
66
Voted
ICST
2009
IEEE
15 years 4 months ago
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Fadi Wedyan, Dalal Alrmuny, James M. Bieman
DSN
2008
IEEE
15 years 4 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
SSDBM
2007
IEEE
172views Database» more  SSDBM 2007»
15 years 3 months ago
Enabling Real-Time Querying of Live and Historical Stream Data
Applications that query data streams in order to identify trends, patterns, or anomalies can often benefit from comparing the live stream data with archived historical stream dat...
Frederick Reiss, Kurt Stockinger, Kesheng Wu, Arie...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 3 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
DEXAW
2006
IEEE
116views Database» more  DEXAW 2006»
15 years 3 months ago
Architecture Evaluation for Distributed Auto-ID Systems
Auto-ID technologies allow capturing the time and location of products in the supply chain for tracking and tracing. This paves the way for a variety of business applications, suc...
Hong Hai Do, Jürgen Anke, Gregor Hackenbroich