Sciweavers

667 search results - page 52 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
114
Voted
RAID
1999
Springer
15 years 6 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
103
Voted
ICISS
2007
Springer
15 years 8 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
USS
2004
15 years 3 months ago
On Gray-Box Program Tracking for Anomaly Detection
Many host-based anomaly detection systems monitor a process ostensibly running a known program by observing the system calls the process makes. Numerous improvements to the precis...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
ATAL
2009
Springer
15 years 9 months ago
Sensitivity analysis for distributed optimization with resource constraints
Previous work in multiagent coordination has addressed the challenge of planning in domains where agents must optimize a global goal, while satisfying local resource constraints. ...
Emma Bowring, Zhengyu Yin, Rob Zinkov, Milind Tamb...
152
Voted
BMVC
2010
15 years 17 days ago
Histogram of Body Poses and Spectral Regression Discriminant Analysis for Human Action Categorization
This paper explores a recently proposed and rarely reported subspace learning method, Spectral Regression Discriminant Analysis (SRDA) [1, 2], on silhouette based human action rec...
Ling Shao, Xiuli Chen