Sciweavers

51 search results - page 7 / 11
» Isolating Intrusions by Automatic Experiments
Sort
View
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
AIIDE
2006
13 years 9 months ago
Predicting User Physiological Response for Interactive Environments: An Inductive Approach
Affective reasoning holds great potential for interactive digital entertainment, education, and training. Incorporating affective reasoning into the decision-making capabilities o...
Scott W. McQuiggan, Sunyoung Lee, James C. Lester
ICDAR
2005
IEEE
14 years 1 months ago
Distinguishing Mathematics Notation from English Text using Computational Geometry
A trainable method for distinguishing between mathematics notation and natural language (here, English) in images of textlines, using computational geometry methods only with no a...
Derek M. Drake, Henry S. Baird
MOBISYS
2005
ACM
14 years 7 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...
ASPLOS
2009
ACM
14 years 2 months ago
Recovery domains: an organizing principle for recoverable operating systems
We describe a strategy for enabling existing commodity operating systems to recover from unexpected run-time errors in nearly any part of the kernel, including core kernel compone...
Andrew Lenharth, Vikram S. Adve, Samuel T. King