Sciweavers

2269 search results - page 330 / 454
» Behavioral Intrusion Detection
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 10 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ICIP
2001
IEEE
14 years 11 months ago
Automatic monitoring of waste-water in industrial plants basins
We describe an algorithm for the analysis of color images of basins which gather dirty water, with the objective of detecting and estimate the presence of exceeding combustible oi...
Gaetano Baldini, Paola Campadelli, Raffaella Lanza...
ICIP
2009
IEEE
14 years 11 months ago
Extraction Of Contextual Information For Automotive Applications
In the near future automatic systems able to detect the traffic situation and to understand driver behavior and intent will probably become vehicles tool to improve driver safety....
DAC
2007
ACM
14 years 11 months ago
Hardware Support for Secure Processing in Embedded Systems
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
Shufu Mao, Tilman Wolf
GLOBECOM
2009
IEEE
14 years 4 months ago
Medium Access Control Signaling for Reliable Spectrum Agile Radios
—We address the problem of collaborative sensing in cognitive radios. In a cognitive radio network, all the nodes may sense the spectrum simultaneously. They should then exchange...
Ehsan Azarnasab, Rong-Rong Chen, Koon Hoo Teo, Zhi...