Sciweavers

8177 search results - page 94 / 1636
» Detecting System Emulators
Sort
View
TWC
2011
232views more  TWC 2011»
13 years 5 months ago
Joint Detection of Primary Systems Using UWB Impulse Radios
Abstract—Regulation in Europe and Japan requires the implementation of detect-and-avoid (DAA) techniques in some bands for the coexistence of licensed primary systems and seconda...
Serhat Erküçük, Lutz H.-J. Lampe,...
JIPS
2010
195views more  JIPS 2010»
13 years 4 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
14 years 2 days ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 10 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman