Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,198 papers from all fields of science
Search
Sign In
Create Free Account
File integrity monitoring
Known as:
FIM
File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Advanced Intrusion Detection Environment
Baseline (configuration management)
Checksum
Computer file
Expand
Broader (2)
Computer forensics
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
SBAS integrity data in e-navigation systems
P. Zalewski
2016
Corpus ID: 66946389
The paper presents the usable form of SBAS integrity data presentation in e-navigation systems. The usability testing of ECDIS…
Expand
2015
2015
Method and apparatus of lapse monitoring
陈易成
,
林毅轩
,
刘昆灏
2015
Corpus ID: 65199195
At least one lapse monitoring method and a device are provided. In the method, when each frame of one or more frames of a…
Expand
2013
2013
Fault Detection of Non-Gaussian Processes Based on Model Migration
Ying-wei Zhang
,
Jiayu An
,
Chi Ma
IEEE Transactions on Control Systems Technology
2013
Corpus ID: 33680338
In this paper, a new modeling approach is proposed for common and specific feature extraction. The original space of a mode can…
Expand
2013
2013
Minimum mean squared prediction error criterion based improved independent component analysis method for process monitoring
Lianfang Cai
,
Xuemin Tian
,
Yuping Cao
2013
Corpus ID: 62633774
Abstract Independent component analysis (ICA) is a newly emerging feature extraction method for non-Gaussian process monitoring…
Expand
Review
2012
Review
2012
Automatic filtering of terrestrial laser scanner data from cylindrical tunnels
C. Stal
,
Timothy Nuttens
,
D. Constales
,
K. Schotte
,
H. Backer
,
A. D. Wulf
2012
Corpus ID: 26723584
In 2010, the construction of a double tube railway tunnel started under the Scheldt River in the port of Antwerp, Belgium. During…
Expand
2012
2012
A File Integrity Monitoring System Based on Virtual Machine
Zhu Wang
,
Tao Huang
,
Shan Wen
Second International Conference on…
2012
Corpus ID: 19164481
This paper describes the design and implementation of a file integrity monitoring system, named FSGuard, based on the…
Expand
Review
2003
Review
2003
GNSS Receiver Autonomous Integrity Monitoring: A Separability Analysis
S. Hewitson
2003
Corpus ID: 16294957
Receiver Autonomous Integrity Monitoring (RAIM) refers to integrity monitoring of GNSS navigation signals performed by a receiver…
Expand
2003
2003
Mapping between QoS Parameters and Network Performance Metrics for SLA monitoring
Hyojun Lee
,
Myung-Sup Kim
,
J. W. Hong
2003
Corpus ID: 18815782
Service Level Agreement (SLA) is a formal negotiated agreement between a service provider and a customer. The service level…
Expand
2002
2002
LAAS Ground Facility Design Improvements to Meet Proposed Requirements for Category II/III Operations
S. Pullen
,
M. Luo
,
+4 authors
P. Enge
2002
Corpus ID: 1003713
Stanford University has developed a Local Area Augmentation System (LAAS) ground facility prototype known as the Integrity…
Expand
2002
2002
Urban Stormwater BMP Performance Monitoring - Chapters 1 & 2
2002
Corpus ID: 11503143
This guidance has been developed by integrating experience gleaned from field monitoring activities conducted by members of ASCE…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE