Sciweavers

708 search results - page 133 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
IJSN
2008
147views more  IJSN 2008»
13 years 7 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
IJON
2007
91views more  IJON 2007»
13 years 7 months ago
Dynamics of parameters of neurophysiological models from phenomenological EEG modeling
We investigate a recently proposed method for the analysis of oscillatory patterns in EEG data, with respect to its capacity of further quantifying processes on slower (< 1 Hz)...
E. Olbrich, Thomas Wennekers
NDSS
2006
IEEE
14 years 1 months ago
Protocol-Independent Adaptive Replay of Application Dialog
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...
MOBISYS
2005
ACM
14 years 7 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...
CII
2006
95views more  CII 2006»
13 years 7 months ago
A neuro-fuzzy monitoring system: Application to flexible production systems
The multiple reconfiguration and the complexity of the modern production system lead to design intelligent monitoring aid systems. Accordingly, the use of neurofuzzy technics seem...
N. Palluat, Daniel I. Racoceanu, Noureddine Zerhou...