Sciweavers

11603 search results - page 2210 / 2321
» Securing Embedded Systems
Sort
View
105
Voted
SPIEVIP
2008
15 years 4 months ago
Visual surveillance in maritime port facilities
In this work we propose a method for securing port facilities which uses a set of video cameras to automatically detect various vessel classes moving within buffer zones and off-l...
Mikel D. Rodriguez Sullivan, Mubarak Shah
128
Voted
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 4 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
123
Voted
DIMVA
2008
15 years 3 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
117
Voted
SERVICES
2010
119views more  SERVICES 2010»
15 years 3 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
138
Voted
GCA
2008
15 years 3 months ago
A Grid Resource Broker with Dynamic Loading Prediction Scheduling Algorithm in Grid Computing Environment
In a Grid Computing environment, there are various important issues, including information security, resource management, routing, fault tolerance, and so on. Among these issues, ...
Yi-Lun Pan, Chang-Hsing Wu, Weicheng Huang
« Prev « First page 2210 / 2321 Last » Next »