Sciweavers

787 search results - page 157 / 158
» Subversion-Resilient Signature Schemes
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
BMCBI
2007
207views more  BMCBI 2007»
13 years 10 months ago
Discovering biomarkers from gene expression data for predicting cancer subgroups using neural networks and relational fuzzy clus
Background: The four heterogeneous childhood cancers, neuroblastoma, non-Hodgkin lymphoma, rhabdomyosarcoma, and Ewing sarcoma present a similar histology of small round blue cell...
Nikhil R. Pal, Kripamoy Aguan, Animesh Sharma, Shu...
JCP
2006
92views more  JCP 2006»
13 years 9 months ago
A Novel Pulse Echo Correlation Tool for Transmission Path Testing and Fault Diagnosis
Abstract-- In this paper a novel pulse sequence testing methodology is presented [22] as an alternative to Time Domain Reflectometry (TDR) for transmission line health condition mo...
David M. Horan, Richard A. Guinee
KAIS
2006
247views more  KAIS 2006»
13 years 9 months ago
XCQ: A queriable XML compression system
XML has already become the de facto standard for specifying and exchanging data on the Web. However, XML is by nature verbose and thus XML documents are usually large in size, a fa...
Wilfred Ng, Wai Yeung Lam, Peter T. Wood, Mark Lev...
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 4 months ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...