Sciweavers

1051 search results - page 101 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
VTS
2005
IEEE
145views Hardware» more  VTS 2005»
14 years 1 months ago
Hardware Results Demonstrating Defect Detection Using Power Supply Signal Measurements
The power supply transient signal (IDDT) method that we propose for defect detection analyze regional signal variations introduced by defects at a set of power supply pads on the ...
Dhruva Acharyya, Jim Plusquellic
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 2 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CEAS
2008
Springer
13 years 10 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
ACSAC
2005
IEEE
14 years 1 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
KES
2008
Springer
13 years 8 months ago
Epileptic Seizure Classification Using Neural Networks with 14 Features
Epilepsy is one of the most frequent neurological disorders. The main method used in epilepsy diagnosis is electroencephalogram (EEG) signal analysis. However this method requires ...
Rui P. Costa, Pedro Oliveira, Guilherme Rodrigues,...