Sciweavers

8177 search results - page 128 / 1636
» Detecting System Emulators
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
IPPS
2009
IEEE
14 years 5 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
IROS
2006
IEEE
113views Robotics» more  IROS 2006»
14 years 4 months ago
A Hybrid Approach to Practical Self Collision Detection System of Humanoid Robot
— Online self collision detection system for humanoid robots is an essentially important function for developing sensor based behaviors without worrying about breaking hardware. ...
Kei Okada, Masayuki Inaba
CLUSTER
1999
IEEE
13 years 10 months ago
Simulative performance analysis of gossip failure detection for scalable distributed systems
Three protocols for gossip-based failure detection services in large-scale heterogeneous clusters are analyzed and compared. The basic gossip protocol provides a means by which fai...
Mark W. Burns, Alan D. George, Bradley A. Wallace
RE
2002
Springer
13 years 10 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...