Sciweavers

592 search results - page 71 / 119
» Learning of personalized security settings
Sort
View
NIPS
1997
13 years 9 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen
ISI
2005
Springer
14 years 1 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
ICICS
2007
Springer
14 years 1 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
TITS
2011
150views more  TITS 2011»
13 years 2 months ago
Online Spatio-Temporal Risk Assessment for Intelligent Transportation Systems
—Due to modern pervasive wireless technologies and high-performance monitoring systems, spatio-temporal information plays an important role in areas such as intelligent transport...
Ondrej Linda, Milos Manic