Sciweavers

2270 search results - page 339 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CCS
2007
ACM
15 years 10 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
ACISP
2001
Springer
15 years 8 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito
148
Voted
IPM
2007
182views more  IPM 2007»
15 years 4 months ago
A probabilistic music recommender considering user opinions and audio features
A recommender system has an obvious appeal in an environment where the amount of on-line information vastly outstrips any individual’s capability to survey. Music recommendation...
Qing Li, Sung-Hyon Myaeng, Byeong Man Kim
ACSAC
2003
IEEE
15 years 7 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
185
Voted
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
15 years 9 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen