Sciweavers

1795 search results - page 153 / 359
» Security Models and Information Flow
Sort
View
IWIA
2005
IEEE
15 years 9 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
195
Voted
MICCAI
2007
Springer
16 years 5 months ago
Object Localization Based on Markov Random Fields and Symmetry Interest Points
We present an approach to detect anatomical structures by configurations of interest points, from a single example image. The representation of the configuration is based on Markov...
Branislav Micusík, Georg Langs, Horst Bisch...
DAGSTUHL
2006
15 years 5 months ago
Context Dependent Analysis of BioAmbients
BioAmbients is a derivative of mobile ambients that has shown promise of describing interesting features of the behaviour of biological systems. The technical contribution of this...
Henrik Pilegaard, Hanne Riis Nielson, Flemming Nie...
DAGSTUHL
2001
15 years 5 months ago
JaVis: A UML-Based Visualization and Debugging Environment for Concurrent Java Programs
Debugging concurrent Java programs is a difficult task because of multiple control flows and inherent nondeterminism. It requires techniques not provided by traditional debuggers ...
Katharina Mehner
SECURWARE
2008
IEEE
15 years 10 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis