Sciweavers

450 search results - page 3 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 2 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
ACISP
2005
Springer
14 years 2 months ago
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the ...
Phillip Pudney, Jill Slay
AIIDE
2009
13 years 9 months ago
Investigating the Interplay between Camera Viewpoints, Game Information, and Challenge
Players perceive information about game environments through a virtual camera. While a significant discussion in the industry and in academic research circles has centered around ...
Arnav Jhala, Martin Schwartz, Hector Perez Martine...
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
14 years 12 days ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
ISICA
2009
Springer
14 years 3 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong