Sciweavers

2236 search results - page 266 / 448
» Intrusion detection techniques and approaches
Sort
View
ISSTA
2009
ACM
14 years 5 months ago
Time-aware test-case prioritization using integer linear programming
Techniques for test-case prioritization re-order test cases to increase their rate of fault detection. When there is a fixed time budget that does not allow the execution of all ...
Lu Zhang, Shan-Shan Hou, Chao Guo, Tao Xie, Hong M...
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
14 years 23 days ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
DATAMINE
2008
219views more  DATAMINE 2008»
13 years 11 months ago
Correlating burst events on streaming stock market data
Abstract We address the problem of monitoring and identification of correlated burst patterns in multi-stream time series databases. We follow a two-step methodology: first we iden...
Michail Vlachos, Kun-Lung Wu, Shyh-Kwei Chen, Phil...
TROB
2008
124views more  TROB 2008»
13 years 10 months ago
A Dynamic-Model-Based Wheel Slip Detector for Mobile Robots on Outdoor Terrain
Abstract--This paper introduces a model-based approach to estimating longitudinal wheel slip and detecting immobilized conditions of autonomous mobile robots operating on outdoor t...
Chris C. Ward, Karl Iagnemma
PERVASIVE
2011
Springer
13 years 1 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...