Sciweavers

1503 search results - page 80 / 301
» Detecting Anomalies in Graphs
Sort
View
CISIM
2008
IEEE
15 years 11 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
MINENET
2006
ACM
15 years 10 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
EUROMED
2010
15 years 2 months ago
Hyperspectral Ground Truth Data for the Detection of Buried Architectural Remains
The aim of the study is to validate hyperspectral ground data for the detection of buried architectural remains. For this reason spectro-radiometric measurements were taken from an...
Athos Agapiou, Diofantos G. Hadjimitsis, Apostolos...
ADHOCNETS
2009
Springer
15 years 11 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
ACMSE
2006
ACM
15 years 10 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta