Sciweavers

515 search results - page 79 / 103
» Measuring Voter-Controlled Privacy
Sort
View
CCS
2004
ACM
14 years 3 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ESORICS
2004
Springer
14 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
UIALL
2004
Springer
14 years 3 months ago
A Question of Realism
Abstract. We present the results of an exploratory study investigating the feasibility of using multimedia software to teach life skills to adults with learning difficulties. As a ...
Richard Hetherington, Alison Crerar, Phil Turner
ACSAC
2003
IEEE
14 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
ACSAC
2003
IEEE
14 years 3 months ago
Synthesizing Test Data for Fraud Detection Systems
This paper reports an experiment aimed at generating synthetic test data for fraud detection in an IP based videoon-demand service. The data generation verifies a methodology pre...
Emilie Lundin Barse, Håkan Kvarnström, ...