Sciweavers

194 search results - page 33 / 39
» Behavioral Distance for Intrusion Detection
Sort
View
CVPR
2007
IEEE
14 years 10 months ago
Real-time Automatic Deceit Detection from Involuntary Facial Expressions
Being the most broadly used tool for deceit measurement, the polygraph is a limited method as it suffers from human operator subjectivity and the fact that target subjects are awa...
Zhi Zhang, Vartika Singh, Thomas E. Slowe, Sergey ...
IJVR
2007
85views more  IJVR 2007»
13 years 7 months ago
Detection of Landmarks for Clustering of Online-Game Players
—Understanding of player behaviors is an important issue to keep online games interesting to their players. Focusing on player movement, in our previous work, we proposed a metho...
Ruck Thawonmas, Masayoshi Kurashige, Kuan-Ta Chen
ICIW
2009
IEEE
14 years 2 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
TIME
2008
IEEE
14 years 2 months ago
Time Aware Mining of Itemsets
Frequent behavioural pattern mining is a very important topic of knowledge discovery, intended to extract correlations between items recorded in large databases or Web acces logs....
Bashar Saleh, Florent Masseglia
ICPPW
2002
IEEE
14 years 25 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins