Sciweavers

2990 search results - page 426 / 598
» Thresholding for Change Detection
Sort
View
IWINAC
2007
Springer
15 years 10 months ago
Automatic Control of Video Surveillance Camera Sabotage
One of the main characteristics of a video surveillance system is its reliability. To this end, it is needed that the images captured by the videocameras are an accurate representa...
Pedro Gil-Jiménez, Roberto Javier Ló...
SASN
2006
ACM
15 years 10 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
ACSAC
2005
IEEE
15 years 10 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
IPPS
2005
IEEE
15 years 10 months ago
A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance
Traditional techniques for building dependable, highperformance distributed systems are too expensive for most non-critical systems, often causing dependability to be sidelined as...
Vikram S. Adve, Adnan Agbaria, Matti A. Hiltunen, ...
ESAS
2005
Springer
15 years 9 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...