Sciweavers

1244 search results - page 159 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
ACMSE
2004
ACM
15 years 10 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
EDBTW
2010
Springer
15 years 11 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
125
Voted
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
15 years 10 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
IJCAI
2007
15 years 6 months ago
Automated Heart Wall Motion Abnormality Detection from Ultrasound Images Using Bayesian Networks
Coronary Heart Disease can be diagnosed by measuring and scoring regional motion of the heart wall in ultrasound images of the left ventricle (LV) of the heart. We describe a comp...
Maleeha Qazi, Glenn Fung, Sriram Krishnan, R&oacut...
PVLDB
2010
166views more  PVLDB 2010»
15 years 3 months ago
Complex Event Detection at Wire Speed with FPGAs
Complex event detection is an advanced form of data stream processing where the stream(s) are scrutinized to identify given event patterns. The challenge for many complex event pr...
Louis Woods, Jens Teubner, Gustavo Alonso