Sciweavers

294 search results - page 18 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
JNW
2008
101views more  JNW 2008»
13 years 8 months ago
Micro-controller based Remote Monitoring using Mobile through Spoken Commands
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
14 years 10 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
SI3D
1992
ACM
14 years 20 days ago
Interactive Viewpoint Control and Three-Dimensional Operations
Techniques are discussed for creating a rendered view into a 3D scene,interactively based on the locations and orientations of the observer's head and the display surface. St...
Michael McKenna
ACSAC
2005
IEEE
14 years 2 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
HAIS
2010
Springer
14 years 1 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...