نتایج جستجو برای: based detection

تعداد نتایج: 3322688  

Journal: :Nature Cell Biology 2021

1981
Steven Burrows Seyed M. M. Tahaghoghi Justin Zobel

ABSTRACT: The copying of programming assignments is a widespread problem in academic institutions. Manual plagiarism detection is time-consuming, and current popular plagiarism detection systems are not scalable to large code repositories. While there are text-based plagiarism detection systems capable of handling millions of student papers, comparable systems for codebased plagiarism detection...

2011
Jason Reeves Ashwin Ramaswamy Michael E. Locasto Sergey Bratus Sean W. Smith

Securing embedded control systems presents a unique challenge. In addition to the resource restrictions inherent to embedded devices, embedded control systems must accommodate strict, non-negotiable timing requirements, and their massive scale greatly increases other costs such as power consumption. These constraints render conventional host-based intrusion detection – using a hypervisor to cre...

2015

Select Up to 5 Products to Compare. Compare The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file. List of 3 free intrusion detection and prevention software, system & tools for Windows Snort, OSSEC for Enterprise use and WinPatrol for home use. network with different malicious software and processes developed by numerous real time intrusion dete...

Journal: :CoRR 2011
Ferdous A. Barbhuiya Santosh Biswas Sukumar Nandi

Spoofing with falsified IP-MAC pair is the first step in most of the LAN based-attacks. Address Resolution Protocol (ARP) is stateless, which is the main cause that makes spoofing possible. Several network level and host level mechanisms have been proposed to detect and mitigate ARP spoofing but each of them has their own drawback. In this paper we propose a Host-based Intrusion Detection syste...

2013
Hari Om Alok Kumar Gupta

The security of a system is an important issue due to the latest advancements in information technology. Intrusion Detection Systems are used to identify the attacks and malicious activities in the computer systems. This paper discusses a new host based intrusion detection system for detecting changes in hardware profile using fuzzy inference rule. The proposed system is able to analyze and det...

2017
Olga Litvinova Pavel Seredin Tatiana Litvinova John Lyell

Psychology studies show that people detect deception no more accurately than by chance, and it is therefore important to develop tools to enable the detection of deception. The problem of deception detection has been studied for a significant amount of time, however in the last 1015 years we have seen methods of computational linguistics being employed with greater frequency. Texts are processe...

Journal: :journal of artificial intelligence in electrical engineering 0
peyman jabraelzade rahim parikhani

this paper demonstrates design and fabrication o f a mechatronic system for human drowsiness detection. this system can be used in multiple places. for example, in factories, it is used on some dangerous machinery and in cars in order t o prevent the operator o r driver from falling asleep. this system is composed of three parts: (1) mechanical, (2) electrical and (3) image processing system. a...

Journal: :Journal of Vision 2013

Journal: :International Journal of Computer Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید