Sciweavers

14704 search results - page 2637 / 2941
» computing 2007
Sort
View
RAID
2007
Springer
15 years 10 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...
RAID
2007
Springer
15 years 10 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
113
Voted
RAID
2007
Springer
15 years 10 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
ROBOCUP
2007
Springer
140views Robotics» more  ROBOCUP 2007»
15 years 10 months ago
Tailored Real-Time Simulation for Teams of Humanoid Robots
Abstract. Developing and testing the key modules of autonomous humanoid soccer robots (e.g., for vision, localization, and behavior control) in software-in-the-loop (SIL) experimen...
Martin Friedmann, Karen Petersen, Oskar von Stryk
ROBOCUP
2007
Springer
208views Robotics» more  ROBOCUP 2007»
15 years 10 months ago
3D Tracking by Catadioptric Vision Based on Particle Filters
This paper presents a robust tracking system for autonomous robots equipped with omnidirectional cameras. The proposed method uses a 3D shape and color-based object model. This all...
Matteo Taiana, José António Gaspar, ...
« Prev « First page 2637 / 2941 Last » Next »