Sciweavers

792 search results - page 136 / 159
» Reading What Machines
Sort
View
IMC
2010
ACM
13 years 5 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
SIGSOFT
2010
ACM
13 years 5 months ago
Synthesis of live behaviour models
We present a novel technique for synthesising behaviour models that works for an expressive subset of liveness properties and conforms to the foundational requirements engineering...
Nicolás D'Ippolito, Víctor A. Braber...
USS
2010
13 years 5 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
ICHIT
2009
Springer
13 years 5 months ago
Design and implementation of a live-analysis digital forensic system
As the popularity of the internet continues growing, not only change our life, but also change the way of crime. Number of crime by computer as tools, place or target, cases of su...
Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn
ICONIP
2009
13 years 5 months ago
Exploring Early Classification Strategies of Streaming Data with Delayed Attributes
In contrast to traditional machine learning algorithms, where all data are available in batch mode, the new paradigm of streaming data poses additional difficulties, since data sam...
Mónica Millán-Giraldo, J. Salvador S...