Sciweavers

1291 search results - page 93 / 259
» Intrusion Detection for Distributed Applications
Sort
View
IMC
2009
ACM
14 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
PDP
2007
IEEE
14 years 4 months ago
Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations
Heterogeneous networks of workstations have rapidly become a cost-effective computing solution in many application areas. This paper develops several highly innovative parallel al...
Antonio Plaza, David Valencia, Soraya Blazquez, Ja...
HASE
2007
IEEE
14 years 4 months ago
A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance
We adapt the classic cusum change-point detection algorithm for applications to data network monitoring where various and numerous performance and reliability metrics are availabl...
Qi Zhang, Carlos Rendón, Veronica Montes De...
KBS
2008
110views more  KBS 2008»
13 years 9 months ago
Intensity-based image registration using multiple distributed agents
Image registration is the process of geometrically aligning images taken from different sensors, viewpoints or instances in time. It plays a key role in the detection of defects o...
Roger J. Tait, Gerald Schaefer, Adrian A. Hopgood
JOT
2010
113views more  JOT 2010»
13 years 8 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada