Sciweavers

257 search results - page 45 / 52
» A New Model for Dynamic Intrusion Detection
Sort
View
KBSE
2007
IEEE
14 years 1 months ago
Testing concurrent programs using value schedules
Concurrent programs are difficult to debug and verify because of the nondeterministic nature of concurrent executions. A particular concurrency-related bug may only show up under ...
Jun Chen, Steve MacDonald
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 1 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
CVPR
2011
IEEE
13 years 3 months ago
Branch and Track
We present a new paradigm for tracking objects in video in the presence of other similar objects. This branch-andtrack paradigm is also useful in the absence of motion, for the di...
Steve Gu, Carlo Tomasi
KBSE
2005
IEEE
14 years 1 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
JCST
2008
121views more  JCST 2008»
13 years 7 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu