Sciweavers

8177 search results - page 55 / 1636
» Detecting System Emulators
Sort
View
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 9 months ago
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
Julie Greensmith, Uwe Aickelin, Jamie Twycross
IEEEIAS
2008
IEEE
14 years 3 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
ATS
2000
IEEE
107views Hardware» more  ATS 2000»
14 years 1 months ago
Accumulation-based concurrent fault detection for linear digital state variable systems
An algorithmic fault detection scheme for linear digital state variable systems is proposed. The proposed scheme eliminates the necessity of observing the internal states of the s...
Ismet Bayraktaroglu, Alex Orailoglu
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
14 years 3 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
IEEEARES
2009
IEEE
14 years 3 months ago
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory locations during program execution. Most implementat...
Hyung Chan Kim, Angelos D. Keromytis, Michael Covi...