Sciweavers

290 search results - page 25 / 58
» Attack detection in time series for recommender systems
Sort
View
JNW
2008
118views more  JNW 2008»
13 years 7 months ago
The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
Sanjeeb Nanda, Narsingh Deo
ACNS
2004
Springer
128views Cryptology» more  ACNS 2004»
14 years 2 months ago
A Novel Framework for Alert Correlation and Understanding
Abstract. We propose a novel framework named Hidden Colored PetriNet for Alert Correlation and Understanding (HCPN-ACU) in intrusion detection system. This model is based upon the ...
Dong Yu, Deborah A. Frincke
ISMIS
2005
Springer
14 years 2 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
TSE
2010
152views more  TSE 2010»
13 years 7 months ago
An Experience in Testing the Security of Real-World Electronic Voting Systems
—Voting is the process through which a democratic society determines its government. Therefore, voting systems are as important as other well-known critical systems, such as air ...
Davide Balzarotti, Greg Banks, Marco Cova, Viktori...

Publication
179views
14 years 19 days ago
AutoSelect: What You Want Is What You Get Real-Time Processing of Visual Attention and Affect
While objects of our focus of attention (“where we are looking at”) and accompanying affective responses to those objects is part of our daily experience, little research exis...
Nikolaus Bee, Helmut Prendinger, Arturo Nakasone, ...