Sciweavers

458 search results - page 60 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
15 years 8 days ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
ACMSE
2004
ACM
14 years 4 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
MASCOTS
2007
14 years 10 days ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
ICSE
2007
IEEE-ACM
14 years 11 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
CVIU
2004
152views more  CVIU 2004»
13 years 10 months ago
Detecting image orientation based on low-level visual content
Accurately and automatically detecting image orientation is of great importance in intelligent image processing. In this paper, we present automatic image orientation detection al...
Yongmei Michelle Wang, HongJiang Zhang