The design, development, and optimization of modern combine harvesters require a thorough understanding and a suitable representation (model) of each machine system as …
J Greensmith - Proceedings of the 2015 annual conference on genetic …, 2015 - dl.acm.org
The Internet of Things is a network ofsmart'objects, transforming everyday objects into entities which can measure, sense and understand their environment. The devices are …
Applying machine learning methods in scenarios involving smart homes is a complex task. The many possible variations of sensors, feature representations, machine learning …
KM Kim, H Kim, K Kim - Proc. Comput. Secur. Symp, 2015 - caislab.kaist.ac.kr
Abstract Signature-based Intrusion Detection System (IDS) can detect only known attacks that have signatures. As new unknown-attacks are appearing continuously, the detection of …
The autonomous hybrid-driven underwater glider presented in this thesis combines the concept of a buoyancy-driven underwater glider and a conventional autonomous …
CS Kumar, K Iyakutty - International Journal of Computer Applications, 2015 - Citeseer
ABSTRACT A novel approach for the data leak detection in the cloud environment is discussed in this paper. The paper uses the semantic based clustering for the anomaly …
VV Ramana, YS Reddy, GRS Reddy, P Ravi - International Journal of …, 2015 - Citeseer
------------------------------------------------------------------ABSTRACT-------------------------------------------- --------------------Traditional computing techniques and systems consider a main process …
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we …
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system …