Sciweavers

417 search results - page 74 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
LOPSTR
2004
Springer
14 years 1 months ago
Determinacy Analysis for Logic Programs Using Mode and Type Information
We propose an analysis for detecting procedures and goals that are deterministic (i.e. that produce at most one solution), or predicates whose clause tests are mutually exclusive (...
Pedro López-García, Francisco Bueno,...
ICRA
2003
IEEE
141views Robotics» more  ICRA 2003»
14 years 1 months ago
Outdoor exploration and SLAM using a compressed filter
Abstract— In this paper we describe the use of automatic exploration for autonomous mapping of outdoor scenes. We describe a real-time SLAM implementation along with an autonomou...
John Folkesson, Henrik I. Christensen
APGV
2010
ACM
227views Visualization» more  APGV 2010»
13 years 11 months ago
Measuring the perception of light inconsistencies
In this paper we explore the ability of the human visual system to detect inconsistencies in the illumination of objects in images. We specifically focus on objects being lit fro...
Jorge Lopez-Moreno, Veronica Sundstedt, Francisco ...
DIMVA
2008
13 years 9 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...