Sciweavers

1804 search results - page 315 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICSEA
2009
IEEE
13 years 6 months ago
Validation of Scenario-Based Business Requirements with Coloured Petri Nets
A scenario can be used to describe a possible instantiation of a given business use case and can be expressed for example as a list of steps written in natural language, or by an ...
Óscar R. Ribeiro, João M. Fernandes
CCS
2009
ACM
14 years 3 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
ISWC
1998
IEEE
14 years 1 months ago
StartleCam: A Cybernetic Wearable Camera
StartleCam is a wearable video camera, computer, and sensing system, which enables the camera to be controlled via both conscious and preconscious events involving the wearer. Tra...
Jennifer Healey, Rosalind W. Picard
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
14 years 3 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
WWW
2007
ACM
14 years 9 months ago
Learning information diffusion process on the web
Many text documents on the Web are not originally created but forwarded or copied from other source documents. The phenomenon of document forwarding or transmission between variou...
Xiaojun Wan, Jianwu Yang