Sciweavers

335 search results - page 23 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 9 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
PAMI
2012
11 years 10 months ago
Pedestrian Detection: An Evaluation of the State of the Art
—Pedestrian detection is a key problem in computer vision, with several applications that have the potential to positively impact quality of life. In recent years, the number of ...
Piotr Dollár, Christian Wojek, Bernt Schiel...
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 26 days ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
CCS
2009
ACM
14 years 2 months ago
Fides: remote anomaly-based cheat detection using client emulation
As a result of physically owning the client machine, cheaters in online games currently have the upper-hand when it comes to avoiding detection. To address this problem and turn t...
Edward C. Kaiser, Wu-chang Feng, Travis Schluessle...
CBSE
2011
Springer
12 years 7 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...