Sciweavers

194 search results - page 38 / 39
» Behavioral Distance for Intrusion Detection
Sort
View
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
SWARM
2008
SPRINGER
149views Optimization» more  SWARM 2008»
13 years 7 months ago
Self-organized flocking in mobile robot swarms
In this paper, we study self-organized flocking in a swarm of mobile robots. We present Kobot, a mobile robot platform developed specifically for swarm robotic studies. We describe...
Ali Emre Turgut, Hande Çelikkanat, Fatih G&...
GIS
2009
ACM
14 years 9 months ago
On-Line Discovery of Flock Patterns in Spatio-Temporal Data
With the recent advancements and wide usage of location detection devices, large quantities of data are collected by GPS and cellular technologies in the form of trajectories. Whi...
Marcos R. Vieira, Petko Bakalov, Vassilis J. Tsotr...
SENSYS
2003
ACM
14 years 1 months ago
Cooperative tracking with binary-detection sensor networks
We present a novel method for tracking the movement of people or vehicles in open outdoor environments using sensor networks. Unlike other sensor network-based methods, which depe...
Kirill Mechitov, Sameer Sundresh, YoungMin Kwon, G...
PR
2008
145views more  PR 2008»
13 years 7 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...