Sciweavers

8177 search results - page 98 / 1636
» Detecting System Emulators
Sort
View
ICEIS
2008
IEEE
14 years 4 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
IWRT
2007
167views Communications» more  IWRT 2007»
13 years 11 months ago
The Practicality of Multi-Tag RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Successful object identification is the primary o...
Leonid Bolotnyy, Scott Krize, Gabriel Robins
ICAT
2003
IEEE
14 years 3 months ago
The study of remote saccade sensing system based on retroreflective feature of the retina
We present a new method for detecting rapid eye movements called a saccade without constraining the head, based on the fast, robust pupil detection technique [1][2]. The technique...
Junji Watanabe, Hideyuki Ando, Dairoku Sekiguchi, ...
GLOBECOM
2009
IEEE
14 years 2 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
CLEF
2010
Springer
13 years 11 months ago
External Plagiarism Detection Based on Standard IR Technology and Fast Recognition of Common Subsequences - Lab Report for PAN a
The plagiarism detection system described in this paper is aiming at bringing external plagiarism detection to the desktop. The main ideas are to incorporate standard IR technologi...
Thomas Gottron