Sciweavers

1291 search results - page 131 / 259
» Intrusion Detection for Distributed Applications
Sort
View
MIDDLEWARE
2004
Springer
14 years 2 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang
FGR
2008
IEEE
115views Biometrics» more  FGR 2008»
14 years 3 months ago
Meeting behavior detection in smart environments: Nonverbal cues that help to obtain natural interaction
Unobtrusive and multiple-sensor interfaces enable observation of natural human behavior in smart environments. Being able to detect, analyze and interpret this activity allows for...
Mannes Poel, Ronald Poppe, Anton Nijholt
IPPS
2007
IEEE
14 years 3 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
DEXA
2009
Springer
88views Database» more  DEXA 2009»
14 years 24 days ago
Significance-Based Failure and Interference Detection in Data Streams
Detecting the failure of a data stream is relatively easy when the stream is continually full of data. The transfer of large amounts of data allows for the simple detection of inte...
Nickolas J. G. Falkner, Quan Z. Sheng
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
13 years 10 months ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee