Sciweavers

226 search results - page 38 / 46
» Intrusion Detection using Continuous Time Bayesian Networks
Sort
View
ANCS
2007
ACM
13 years 11 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ICCS
2007
Springer
13 years 11 months ago
Unusual Event Recognition for Mobile Alarm System
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event,...
Soo Yeong Kwak, Guntae Bae, Kil-Cheon Kim, Hyeran ...
JPDC
2008
217views more  JPDC 2008»
13 years 7 months ago
Parallel techniques for information extraction from hyperspectral imagery using heterogeneous networks of workstations
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. In particular, NASA is continuously gath...
Antonio J. Plaza
SIGMOD
2007
ACM
168views Database» more  SIGMOD 2007»
14 years 7 months ago
In-network execution of monitoring queries in sensor networks
Sensor networks are widely used in many applications for collecting information from the physical environment. In these applications, it is usually necessary to track the relation...
Xiaoyan Yang, Hock-Beng Lim, M. Tamer Özsu, K...