Sciweavers

1804 search results - page 307 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
DASC
2006
IEEE
14 years 16 days ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
FLOPS
2008
Springer
13 years 10 months ago
On-Demand Refinement of Dependent Types
Dependent types are useful for statically checking detailed specifications of programs and detecting pattern match or array bounds errors. We propose a novel approach to applicatio...
Hiroshi Unno, Naoki Kobayashi
ESANN
2006
13 years 10 months ago
Evolino for recurrent support vector machines
Abstract. We introduce a new class of recurrent, truly sequential SVM-like devices with internal adaptive states, trained by a novel method called EVOlution of systems with KErnel-...
Jürgen Schmidhuber, Matteo Gagliolo, Daan Wie...
RAS
2000
135views more  RAS 2000»
13 years 8 months ago
Development of the ring sensor for healthcare automation
This paper presents the development of a miniaturized telemetered ambulatory monitoring device in a ring configuration. The device, called ring sensor, is worn by the patient at a...
Boo-Ho Yang, Sokwoo Rhee
DIMVA
2004
13 years 10 months ago
LIV - The Linux Integrated Viruswall
This paper presents a system developed in Linux aiming the protection of local area networks containing Windows workstations against malicious agents. The developed solution, named...
Teobaldo A. Dantas de Medeiros, Paulo S. Motta Pir...