Sciweavers

458 search results - page 47 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
VIZSEC
2005
Springer
14 years 4 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
ICIP
2008
IEEE
14 years 5 months ago
Breast contour detection with shape priors
Breast cancer conservative treatment (BCCT) is considered the gold standard of breast cancer treatment. However, aesthetic results are heterogeneous and difficult to evaluate in ...
Ricardo Sousa, Jaime S. Cardoso, Joaquim F. Pinto ...
DSN
2009
IEEE
14 years 5 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
SASN
2006
ACM
14 years 4 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
JUCS
2006
123views more  JUCS 2006»
13 years 11 months ago
Detecting Bad Smells in AspectJ
: This paper defines algorithms to automatically detect five types of bad smells that occur in aspect-oriented systems, more specifically those written using the AspectJ language. ...
Eduardo Kessler Piveta, Marcelo Hecht, Marcelo Soa...