Sciweavers

935 search results - page 111 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
SIGCSE
2006
ACM
127views Education» more  SIGCSE 2006»
14 years 3 months ago
SNITCH: a software tool for detecting cut and paste plagiarism
Plagiarism of material from the Internet is a widespread and growing problem. Computer science students, and those in other science and engineering courses, can sometimes get away...
Sebastian Niezgoda, Thomas P. Way
HOST
2009
IEEE
14 years 3 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
IWNAS
2008
IEEE
14 years 3 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
CRV
2009
IEEE
132views Robotics» more  CRV 2009»
14 years 3 months ago
A Vision-Based Control and Interaction Framework for a Legged Underwater Robot
We present a vision-based control and interaction framework for mobile robots, and describe its implementation in a legged amphibious robot. The control scheme enables the robot t...
Junaed Sattar, Gregory Dudek
ATAL
2003
Springer
14 years 2 months ago
A prototype multiAgent network security system
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
Taraka Pedireddy, José M. Vidal