Sciweavers

2236 search results - page 269 / 448
» Intrusion detection techniques and approaches
Sort
View
WICOMM
2008
139views more  WICOMM 2008»
13 years 10 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
CVPR
2005
IEEE
15 years 24 days ago
Generative versus Discriminative Methods for Object Recognition
Many approaches to object recognition are founded on probability theory, and can be broadly characterized as either generative or discriminative according to whether or not the di...
Ilkay Ulusoy, Christopher M. Bishop
SEKE
2004
Springer
14 years 4 months ago
Automated Assistance for Eliciting User Expectations
People often use software for mundane tasks and expect it to be dependable enough for their needs. Unfortunately, the incomplete and imprecise specifications of such everyday sof...
Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip K...
WCRE
2005
IEEE
14 years 4 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
VLSID
1993
IEEE
136views VLSI» more  VLSID 1993»
14 years 2 months ago
A Simulation-Based Test Generation Scheme Using Genetic Algorithms
This paper discusses a Genetic Algorithm-based method of generating test vectorsfor detecting faults in combinational circuits. The GA-based approach combines the merits of two te...
M. Srinivas, Lalit M. Patnaik