<--- Back to Details
First PageDocument Content
Software testing / Software optimization / Hacking / Vulnerability / Code injection / Instrumentation / Anomaly detection / Computing / Computer security / Cyberwarfare
Date: 2011-07-25 05:35:47
Software testing
Software optimization
Hacking
Vulnerability
Code injection
Instrumentation
Anomaly detection
Computing
Computer security
Cyberwarfare

Add to Reading List

Source URL: www.syssec-project.eu

Download Document from Source Website

File Size: 378,13 KB

Share Document on Facebook

Similar Documents

Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

DocID: 1xTRV - View Document

Machine learning / Artificial neural networks / Learning / Artificial intelligence / Applied mathematics / Unsupervised learning / Anomaly detection / Data mining / Data security / Anomaly / Autoencoder / Feature learning

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

DocID: 1xTRg - View Document

Technology / Information and communications technology / Computing / Machine learning / Anomaly detection / Data mining / Data security / Mobile telecommunications / Smartphone / Mobile phone / Anomaly

Anomaly detection based on real-time exploitation of billing systems

DocID: 1xTmR - View Document

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

DocID: 1vnK6 - View Document

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

DocID: 1vlla - View Document