Results 241 to 250 of about 514,554 (290)
Some of the next articles are maybe not open access.

Intrusion Detection in the Cloud

2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009
Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the ...
Sebastian Roschke   +2 more
openaire   +1 more source

Intrusion Detection in Cloud Computing

2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013
Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures become an attractive target for intruders.
FICCO, Massimo   +2 more
openaire   +3 more sources

Cloud detection with SVM technique

2007 IEEE International Geoscience and Remote Sensing Symposium, 2007
Following SPOT satellite family, PLEIADES-HR is a high resolution optical earth observation system developed by CNES and consisting in two satellites with a first launch by the end of 2009. Pleiades-HR will deliver both 70 cm Panchromatic images and 2.8 m multispectral (blue-green-red-near infrared) images with a 21km swath.
Christophe Latry   +2 more
openaire   +1 more source

Detecting clouds and cloud shadows on aerial photographs

Pattern Recognition Letters, 1991
Abstract This paper describes a system for identifying small clouds and their shadows on aerial photographs. The system segments an image into homogeneous regions; selects bright and dark regions as cloud and shadow candidates, respectively; and finds acceptable (cloud, shadow) pairs based on consistent relative position.
Chengye Wang   +2 more
openaire   +1 more source

Anomaly Detection in IaaS Clouds

2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Security is still a major concern in Cloud computing, especially the detection of nefarious use or abuse of cloud instances. One reason for this, is the ever-growing complexity and dynamic of the underlying system design and architecture. To be able to detect misuse of cloud instances, this work presents an anomaly detection system for Infrastructure ...
Frank Dölitzscher   +3 more
openaire   +1 more source

Point Cloud Collision Detection

Computer Graphics Forum, 2004
AbstractIn the past few years, many efficient rendering and surface reconstruction algorithms for point clouds have been developed. However, collision detection of point clouds has not been considered until now, although this is a prerequisite to use them for interactive or animated 3D graphics.We present a novel approach for time‐critical collision ...
Jan Klein 0001, Gabriel Zachmann
openaire   +1 more source

Detection of Daily Clouds on Titan

Science, 2000
We have discovered frequent variations in the near-infrared spectrum of Titan, Saturn's largest moon, which are indicative of the daily presence of sparse clouds covering less than 1% of the area of the satellite. The thermodynamics of Titan's atmosphere and the clouds' altitudes suggest that convection governs their evolutions. Their short lives point
C A, Griffith, J L, Hall, T R, Geballe
openaire   +2 more sources

Intrusion detection in federated clouds

International Journal of Computational Science and Engineering, 2016
In order to overcome the provisioning and scalability limits of a single cloud, cloud federation appears as the computing model in which multiple resources from independent cloud providers can be shared to create large-scale distributed virtual clusters.
FICCO, Massimo   +2 more
openaire   +3 more sources

Co-location Detection on the Cloud

2016
In this work we focus on the problem of co-location as a first step of conducting Cross-VM attacks such as Prime and Probe or Flush+Reload in commercial clouds. We demonstrate and compare three co-location detection methods namely, cooperative Last-Level Cache (LLC) covert channel, software profiling on the LLC and memory bus locking.
Mehmet Sinan Inci   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy