Sciweavers

2269 search results - page 354 / 454
» Behavioral Intrusion Detection
Sort
View
APGV
2007
ACM
14 years 2 months ago
Perception and prediction of simple object interactions
For humans, it is useful to be able to visually detect an object's physical properties. One potentially important source of information is the way the object moves and intera...
Manfred Nusseck, Julien Lagarde, Benoît G. B...
ICDCS
2010
IEEE
14 years 2 months ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter
ASPDAC
2004
ACM
94views Hardware» more  ASPDAC 2004»
14 years 1 months ago
Improving simulation-based verification by means of formal methods
The design of complex systems is largely ruled by the time needed for verification. Even though formal methods can provide higher reliability, in practice often simulation based ve...
Görschwin Fey, Rolf Drechsler
ICSE
2000
IEEE-ACM
14 years 1 months ago
Generating statechart designs from scenarios
This paper presents an algorithm for automatically generating UML statecharts from a collection of UML sequence diagrams. Computer support for this transition between requirements...
Jon Whittle, Johann Schumann
CCS
2008
ACM
14 years 2 days ago
Asynchronous policy evaluation and enforcement
Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions ar...
Matthew Burnside, Angelos D. Keromytis