Results 241 to 250 of about 514,554 (290)
Some of the next articles are maybe not open access.
Intrusion Detection in the Cloud
2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the ...
Sebastian Roschke +2 more
openaire +1 more source
Intrusion Detection in Cloud Computing
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures become an attractive target for intruders.
FICCO, Massimo +2 more
openaire +3 more sources
Cloud detection with SVM technique
2007 IEEE International Geoscience and Remote Sensing Symposium, 2007Following SPOT satellite family, PLEIADES-HR is a high resolution optical earth observation system developed by CNES and consisting in two satellites with a first launch by the end of 2009. Pleiades-HR will deliver both 70 cm Panchromatic images and 2.8 m multispectral (blue-green-red-near infrared) images with a 21km swath.
Christophe Latry +2 more
openaire +1 more source
Detecting clouds and cloud shadows on aerial photographs
Pattern Recognition Letters, 1991Abstract This paper describes a system for identifying small clouds and their shadows on aerial photographs. The system segments an image into homogeneous regions; selects bright and dark regions as cloud and shadow candidates, respectively; and finds acceptable (cloud, shadow) pairs based on consistent relative position.
Chengye Wang +2 more
openaire +1 more source
Anomaly Detection in IaaS Clouds
2013 IEEE 5th International Conference on Cloud Computing Technology and Science, 2013Security is still a major concern in Cloud computing, especially the detection of nefarious use or abuse of cloud instances. One reason for this, is the ever-growing complexity and dynamic of the underlying system design and architecture. To be able to detect misuse of cloud instances, this work presents an anomaly detection system for Infrastructure ...
Frank Dölitzscher +3 more
openaire +1 more source
Point Cloud Collision Detection
Computer Graphics Forum, 2004AbstractIn the past few years, many efficient rendering and surface reconstruction algorithms for point clouds have been developed. However, collision detection of point clouds has not been considered until now, although this is a prerequisite to use them for interactive or animated 3D graphics.We present a novel approach for time‐critical collision ...
Jan Klein 0001, Gabriel Zachmann
openaire +1 more source
Detection of Daily Clouds on Titan
Science, 2000We have discovered frequent variations in the near-infrared spectrum of Titan, Saturn's largest moon, which are indicative of the daily presence of sparse clouds covering less than 1% of the area of the satellite. The thermodynamics of Titan's atmosphere and the clouds' altitudes suggest that convection governs their evolutions. Their short lives point
C A, Griffith, J L, Hall, T R, Geballe
openaire +2 more sources
Intrusion detection in federated clouds
International Journal of Computational Science and Engineering, 2016In order to overcome the provisioning and scalability limits of a single cloud, cloud federation appears as the computing model in which multiple resources from independent cloud providers can be shared to create large-scale distributed virtual clusters.
FICCO, Massimo +2 more
openaire +3 more sources
Co-location Detection on the Cloud
2016In this work we focus on the problem of co-location as a first step of conducting Cross-VM attacks such as Prime and Probe or Flush+Reload in commercial clouds. We demonstrate and compare three co-location detection methods namely, cooperative Last-Level Cache (LLC) covert channel, software profiling on the LLC and memory bus locking.
Mehmet Sinan Inci +3 more
openaire +2 more sources

