Sciweavers

2269 search results - page 371 / 454
» Behavioral Intrusion Detection
Sort
View
WAIM
2010
Springer
13 years 7 months ago
An Efficient Approach for Mining Segment-Wise Intervention Rules in Time-Series Streams
Huge time-series stream data are collected every day from many areas, and their trends may be impacted by outside events, hence biased from its normal behavior. This phenomenon is ...
Yue Wang, Jie Zuo, Ning Yang, Lei Duan, Hong-Jun L...
GI
2009
Springer
13 years 7 months ago
An Improved Method for creating Shared Belief in Communication Constrained Sensor Networks
: Networked systems that gather sensor data in order to react to phenomena in their surroundings are faced with a growing need for adaptive behavior to operate in dynamically chang...
Eelke van Foeken, Peter Hiemstra, Leon Kester
HCI
2009
13 years 7 months ago
The Five Commandments of Activity-Aware Ubiquitous Computing Applications
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
13 years 5 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
NFM
2011
209views Formal Methods» more  NFM 2011»
13 years 5 months ago
Formalizing Probabilistic Safety Claims
A safety claim for a system is a statement that the system, which is subject to hazardous conditions, satisfies a given set of properties. Following work by John Rushby and Bev Li...
Heber Herencia-Zapana, George Hagen, Anthony Narka...