Sciweavers

290 search results - page 12 / 58
» Attack detection in time series for recommender systems
Sort
View
ICASSP
2011
IEEE
13 years 12 days ago
Modified embedding for multi-regime detection in nonstationary streaming data
Many practical data streams are typically composed of several states known as regimes. In this paper, we invoke phase space reconstruction methods from non-linear time series and ...
Evan Kriminger, José Carlos Príncipe...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 8 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ICASSP
2011
IEEE
13 years 13 days ago
Malicious data attack on real-time electricity market
Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Liyan Jia, Robert J. Thomas, Lang Tong
JCP
2007
127views more  JCP 2007»
13 years 8 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
IWDW
2007
Springer
14 years 2 months ago
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...