Sciweavers

1291 search results - page 64 / 259
» Intrusion Detection for Distributed Applications
Sort
View
JPDC
2006
129views more  JPDC 2006»
13 years 8 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
JUCS
2008
112views more  JUCS 2008»
13 years 8 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
TSMC
2008
167views more  TSMC 2008»
13 years 8 months ago
A Human-Computer Interface Using Symmetry Between Eyes to Detect Gaze Direction
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the per...
John J. Magee, Margrit Betke, James Gips, M. R. Sc...
ACSAC
2002
IEEE
14 years 1 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
DOA
2001
97views more  DOA 2001»
13 years 10 months ago
Transparent Dynamic Reconfiguration for CORBA
Distributed systems with high availability requirements have to support some form of dynamic reconfiguration. This means that they must provide the ability to be maintained or upg...
João Paulo A. Almeida, Maarten Wegdam, Mart...