Sciweavers

800 search results - page 125 / 160
» Intrusion Detection Systeme (IDS)
Sort
View

Presentation
921views
12 years 1 months ago
A Method for Pedestrian Position Estimation using Inter-Vehicle Communication
In this paper, we propose a method for detecting the positions of pedestrians by cooperation of multiple cars with directional antennas to support drivers for pedestrian safety. In...
UIST
1995
ACM
13 years 11 months ago
The World Through the Computer: Computer Augmented Interaction with Real World Environments
Current user interface techniques such as WIMP or the desktop metaphor do not support real world tasks, because the focus of these user interfaces is only on human–computer inte...
Jun Rekimoto, Katashi Nagao
CONEXT
2007
ACM
13 years 9 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 7 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
DIM
2009
ACM
14 years 8 days ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad