Sciweavers

152 search results - page 20 / 31
» Measuring intrusion detection capability: an information-the...
Sort
View
WCET
2010
13 years 8 months ago
Hybrid measurement-based WCET analysis at the source level using object-level traces
Hybrid measurement-based approaches to worst-case execution time (WCET) analysis combine measured execution times of small program segments using static analysis of the larger sof...
Adam Betts, Nicholas Merriam, Guillem Bernat
CVPR
2007
IEEE
15 years 12 days ago
Matching Local Self-Similarities across Images and Videos
We present an approach for measuring similarity between visual entities (images or videos) based on matching internal self-similarities. What is correlated across images (or acros...
Eli Shechtman, Michal Irani
IM
2007
13 years 11 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
WISTP
2010
Springer
14 years 5 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
ANSS
2006
IEEE
14 years 4 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...