Sciweavers

58 search results - page 11 / 12
» Detecting Insider Threats by Monitoring System Call Activity
Sort
View
ICRA
2005
IEEE
162views Robotics» more  ICRA 2005»
14 years 1 months ago
Learning to Track Multiple People in Omnidirectional Video
— Meetings are a very important part of everyday life for professionals working in universities, companies or governmental institutions. We have designed a physical awareness sys...
Fernando De la Torre, Carlos Vallespí, Paul...
DAWAK
2008
Springer
13 years 9 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
IPSN
2004
Springer
14 years 24 days ago
Backcasting: adaptive sampling for sensor networks
Wireless sensor networks provide an attractive approach to spatially monitoring environments. Wireless technology makes these systems relatively flexible, but also places heavy d...
Rebecca Willett, Aline Martin, Robert Nowak
CN
2007
224views more  CN 2007»
13 years 7 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...
RAID
1999
Springer
13 years 11 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee