Sciweavers

971 search results - page 132 / 195
» Autonomic Intrusion Detection System
Sort
View
ECBS
2005
IEEE
108views Hardware» more  ECBS 2005»
13 years 10 months ago
Interceptor Based Constraint Violation Detection
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Qianxiang Wang, Aditya P. Mathur
ICRA
2005
IEEE
156views Robotics» more  ICRA 2005»
14 years 2 months ago
A Hierarchical Multiple-Target Tracking Algorithm for Sensor Networks
Abstract— Multiple-target tracking is a canonical application of sensor networks as it exhibits different aspects of sensor networks such as event detection, sensor information f...
Songhwai Oh, Luca Schenato, Shankar Sastry
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
14 years 1 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
AUTONOMICS
2008
ACM
13 years 10 months ago
Design of a fence surveillance system based on wireless sensor networks
In this paper, we present a real application system based on wireless sensor network (WSN) for fence surveillance which is implemented on our development platform for WSN, called ...
Youngsoo Kim, Jonggu Kang, Daeyoung Kim, Eunjo Kim...
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
14 years 3 months ago
Towards a Methodology for Profiling Cyber Criminals
The progress of future e-business and ecommerce will depend on the ability of our legal institutions to protect general users from cyber crimes. While there has been substantial p...
Leonard Kwan, Pradeep Ray, Greg Stephens