Sciweavers

1291 search results - page 92 / 259
» Intrusion Detection for Distributed Applications
Sort
View
ICCCN
2007
IEEE
14 years 4 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...
ICCS
2003
Springer
14 years 2 months ago
A Compress-Based Association Mining Algorithm for Large Dataset
The association mining is one of the primary sub-areas in the field of data mining. This technique had been used in numerous practical applications, including consumer market baske...
Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 11 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
ICCV
1998
IEEE
14 years 11 months ago
Thresholding for Change Detection
Image differencing is used for many applications involving change detection. Although it is usually followed by a thresholding operation to isolate regions of change there are few...
Paul L. Rosin
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski