Sciweavers

2236 search results - page 257 / 448
» Intrusion detection techniques and approaches
Sort
View
ICEIS
2008
IEEE
14 years 5 months ago
Internal Fraud Risk Reduction - Results of a Data Mining Case Study
Corporate fraud these days represents a huge cost to our economy. Academic literature already concentrated on how data mining techniques can be of value in the fight against frau...
Mieke Jans, Nadine Lybaert, Koen Vanhoof
DATE
1997
IEEE
92views Hardware» more  DATE 1997»
14 years 3 months ago
MOSAIC: a multiple-strategy oriented sequential ATPG for integrated circuits
The paper proposes a novel approach in an attempt to solve the test problem for sequential circuits. Up until now, most of the classical test pattern techniques use a number of al...
A. Dargelas, C. Gauthron, Yves Bertrand
CCS
2003
ACM
14 years 4 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
TPDS
2010
256views more  TPDS 2010»
13 years 9 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du
DATE
2007
IEEE
106views Hardware» more  DATE 2007»
14 years 5 months ago
Low-cost protection for SER upsets and silicon defects
Extreme transistor scaling trends in silicon technology are soon to reach a point where manufactured systems will suffer from limited device reliability and severely reduced life...
Mojtaba Mehrara, Mona Attariyan, Smitha Shyam, Kyp...