Sciweavers

971 search results - page 177 / 195
» Autonomic Intrusion Detection System
Sort
View
CCS
2008
ACM
13 years 10 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
STORAGESS
2005
ACM
14 years 2 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
ICAC
2005
IEEE
14 years 2 months ago
Quickly Finding Known Software Problems via Automated Symptom Matching
We present an architecture for and prototype of a system for quickly detecting software problem recurrences. Re-discovery of the same problem is very common in many large software...
Mark Brodie, Sheng Ma, Guy M. Lohman, Laurent Mign...
IROS
2009
IEEE
169views Robotics» more  IROS 2009»
14 years 3 months ago
A miniature jumping robot with self-recovery capabilities
— In nature, many animals are able to jump, upright themselves after landing and jump again. This allows them to move in unstructured and rough terrain. As a further development ...
Mirko Kovac, Manuel Schlegel, Jean-Christophe Zuff...
AUSAI
2006
Springer
14 years 11 days ago
Data Clustering and Visualization Using Cellular Automata Ants
This paper presents two novel features of an emergent data visualization method coined "cellular ants": unsupervised data class labeling and shape negotiation. This metho...
Andrew Vande Moere, Justin James Clayden, Andy Don...