Sciweavers

121 search results - page 19 / 25
» Anomalous trajectory patterns detection
Sort
View
ICCBR
2009
Springer
14 years 2 months ago
Using Meta-reasoning to Improve the Performance of Case-Based Planning
Case-based planning (CBP) systems are based on the idea of reusing past successful plans for solving new problems. Previous research has shown the ability of meta-reasoning approac...
Manish Mehta, Santiago Ontañón, Ashw...
INFOCOM
2005
IEEE
14 years 1 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
14 years 13 hour ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
CAI
2010
Springer
13 years 5 months ago
SMA - The Smyle Modeling Approach
Abstract. This paper introduces the model-based software development lifecycle model SMA--the Smyle Modeling Approach--which is centered around Smyle. Smyle is a dedicated learning...
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...