The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
The aim of the study is to validate hyperspectral ground data for the detection of buried architectural remains. For this reason spectro-radiometric measurements were taken from an...
Athos Agapiou, Diofantos G. Hadjimitsis, Apostolos...
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...