Sciweavers

1777 search results - page 208 / 356
» Surveillance Event Detection
Sort
View
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 10 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
ISW
2005
Springer
15 years 9 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
EXACT
2008
15 years 6 months ago
A Temporal Abductive Diagnostic Process for Runtime Properties Violations
The monitoring of properties of complex software systems can provide the core functionality for detecting violations of such properties. However, the violations detection cannot be...
Theocharis Tsigkritis, George Spanoudakis
ISSTA
2009
ACM
15 years 10 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
AIPR
2003
IEEE
15 years 9 months ago
Quick Response Airborne Deployment of Viper Muzzle Flash Detection and Location System During DC Sniper Attacks
The VIPER infrared muzzle flash detection system was deployed from a helicopter and an airship in response to the Washington, DC area sniper attacks in October 2002. The system co...
M. Pauli, M. C. Ertem, E. Heidhausen