Sciweavers

1636 search results - page 112 / 328
» Detecting similar software applications
Sort
View
ACSAC
2003
IEEE
15 years 10 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
WSC
2008
15 years 6 months ago
Offline commissioning of a PLC-based control system using arena
In this paper, we address a generalized method of mapping a control system simulation model to the PLC emulator being tested using model variables and PLC tags under the offline c...
Jeffery S. Smith, Younchol Cho
NOMS
2010
IEEE
251views Communications» more  NOMS 2010»
15 years 3 months ago
Online detection of utility cloud anomalies using metric distributions
—The online detection of anomalies is a vital element of operations in data centers and in utility clouds like Amazon EC2. Given ever-increasing data center sizes coupled with th...
Chengwei Wang, Vanish Talwar, Karsten Schwan, Part...
IWPC
2006
IEEE
15 years 10 months ago
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws
One of the important activities in re-engineering process is detecting design flaws. Such design flaws prevent an efficient maintenance, and further development of a system. Th...
Mazeiar Salehie, Shimin Li, Ladan Tahvildari
AVSS
2009
IEEE
15 years 11 months ago
Towards Generic Detection of Unusual Events in Video Surveillance
—In this paper, we consider the challenging problem of unusual event detection in video surveillance systems. The proposed approach makes a step toward generic and automatic dete...
Ivan Ivanov, Frédéric Dufaux, Thien ...