Sciweavers

8177 search results - page 175 / 1636
» Detecting System Emulators
Sort
View
VTC
2006
IEEE
174views Communications» more  VTC 2006»
14 years 4 months ago
ML Detection with Blind Linear Prediction for Differential Space-Time Block Code Systems
Abstract— This paper proposes a maximum likelihood detection (MLD) method for the differential space-time block code (DSTBC) in cooperation with blind linear prediction (BLP) of ...
Seree Wanichpakdeedecha, Kazuhiko Fukawa, Hiroshi ...
VIIP
2001
14 years 4 days ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
IEEEIA
2009
13 years 8 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
HPCC
2007
Springer
14 years 4 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
HASE
1999
IEEE
14 years 3 months ago
Fault Detectability Analysis for Requirements Validation of Fault Tolerant Systems
Diego Del Gobbo, Bojan Cukic, Marcello R. Napolita...