Sciweavers

190 search results - page 10 / 38
» From Monitoring Templates to Security Monitoring and Threat ...
Sort
View
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
14 years 2 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...
IV
2002
IEEE
114views Visualization» more  IV 2002»
14 years 18 days ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
ISSA
2004
13 years 9 months ago
A Framework For Monitoring Insider Misuse Of It Applications
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethica...
Aung Htike Phyo
ISPEC
2005
Springer
14 years 1 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
KI
2008
Springer
13 years 7 months ago
Monitoring Movement Behavior by Means of a Large Area Proximity Sensor Array in the Floor
This paper describes an innovative sensor system which can detect and track people in a room by means of an array of capacitive sensors beneath the floor covering. By combining cut...
Axel Steinhage, Christl Lauterbach