Sciweavers

290 search results - page 41 / 58
» Attack detection in time series for recommender systems
Sort
View
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 9 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg
ICC
2009
IEEE
13 years 6 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 8 months ago
Transfer Entropy on Rank Vectors
A number of measures have been proposed for the direction of the coupling between two time series, and transfer entropy (TE) has been found in recent studies to perform consistentl...
Dimitris Kugiumtzis
SIGMETRICS
2008
ACM
142views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
Time synchronization is an essential service in distributed computing and control systems. It is used to enable tasks such as synchronized data sampling and accurate time-offlight...
Thomas Schmid, Zainul Charbiwala, Jonathan Friedma...
RAID
2004
Springer
14 years 1 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...