Sciweavers

8177 search results - page 100 / 1636
» Detecting System Emulators
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
IJEIS
2010
80views more  IJEIS 2010»
13 years 7 months ago
Semantics for Accurate Conflict Detection in SMoVer: Specification, Detection and Presentation by Example
In collaborative software development the utilization of Version Control Systems (VCSs) is a must. For this, a multitude of pessimistic as well as optimistic VCSs for model artifa...
Kerstin Altmanninger, Wieland Schwinger, Gabriele ...
ISICA
2009
Springer
14 years 4 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
INFOCOM
2007
IEEE
14 years 4 months ago
Low-Power Distributed Event Detection in Wireless Sensor Networks
Abstract—In this paper we address the problem of energyefficient event detection in wireless sensor networks (WSNs). Duty cycling is a fundamental approach to conserving energy i...
Yanmin Zhu, Yunhao Liu, Lionel M. Ni, Z. Zhang
ICRA
2007
IEEE
119views Robotics» more  ICRA 2007»
14 years 4 months ago
Implementation of Bio-Inspired Vestibulo-Ocular Reflex in a Quadrupedal Robot
— Studies of primate locomotion have shown that the head and eyes are stabilized in space through the vestibulo-collic and vestibulo ocular Reflexes (VCR, VOR). The VOR is a refl...
Ravi Kaushik, Marek Marcinkiewicz, Jizhong Xiao, S...