Sciweavers

1013 search results - page 190 / 203
» Storage-Based Intrusion Detection
Sort
View
INFOCOM
2010
IEEE
14 years 9 months ago
Multi-Round Sensor Deployment for Guaranteed Barrier Coverage
Abstract--Deploying wireless sensor networks to provide guaranteed barrier coverage is critical for many sensor networks applications such as intrusion detection and border surveil...
Guanqun Yang, Daji Qiao
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 6 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
CVIU
2011
14 years 6 months ago
A wearable gaze tracking system for children in unconstrained environments
We present here a head-mounted gaze tracking system for the study of visual behavior in unconstrained environments. The system is designed both for adults and for infants as young...
Basilio Noris, Jean-Baptiste Keller, Aude Billard
JMLR
2010
185views more  JMLR 2010»
14 years 6 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
FCCM
2011
IEEE
311views VLSI» more  FCCM 2011»
14 years 3 months ago
String Matching in Hardware Using the FM-Index
—String matching is a ubiquitous problem that arises in a wide range of applications in computing, e.g., packet routing, intrusion detection, web querying, and genome analysis. D...
Edward Fernandez, Walid Najjar, Stefano Lonardi