Sciweavers

363 search results - page 27 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
FPL
2001
Springer
96views Hardware» more  FPL 2001»
14 years 3 days ago
System Level Tools for DSP in FPGAs
Abstract. Visual data ow environments are ideally suited for modeling digital signal processing (DSP) systems, as many DSP algorithms are most naturally speci ed by signal ow gra...
James Hwang, Brent Milne, Nabeel Shirazi, Jeffrey ...
ACSAC
2004
IEEE
13 years 11 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
ICRA
1999
IEEE
140views Robotics» more  ICRA 1999»
13 years 12 months ago
Optimal Control of Production Systems with Unreliable Machines and Finite Buffers
In this paper we present a novel formulation for the optimal control of discrete event dynamic processes which represent production systems with unreliable machines and buffers of...
Fabio Balduzzi, Giuseppe Menga, Alessandro Giua
RAID
2009
Springer
14 years 2 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
ACSAC
2003
IEEE
14 years 28 days ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...