Sciweavers

592 search results - page 22 / 119
» Learning of personalized security settings
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
13 years 11 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
CSFW
1998
IEEE
13 years 12 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ECTEL
2007
Springer
14 years 1 months ago
Exploiting Preference Queries for Searching Learning Resources
While the growing number of learning resources increases the choice for learners, it also makes it more and more difficult to find suitable courses. Thus, improved search capabili...
Fabian Abel, Eelco Herder, Philipp Kärger, Da...
ICALT
2008
IEEE
14 years 2 months ago
Competency-Based Intelligent Curriculum Sequencing Using Particle Swarms
As a part of many e-learning initiatives, a set of learning units must be arranged in a particular order to meet the learners’ requirements. This process is known as sequencing ...
Luis de Marcos, Roberto Barchino, José-Javi...
CCS
2009
ACM
13 years 11 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...