Sciweavers

417 search results - page 8 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
ITC
1996
IEEE
127views Hardware» more  ITC 1996»
13 years 12 months ago
Altering a Pseudo-Random Bit Sequence for Scan-Based BIST
This paper presents a low-overhead scheme for built-in self-test of circuits with scan. Complete (100%) fault coverage is obtained without modifying the function logic and without...
Nur A. Touba, Edward J. McCluskey
ACSAC
2007
IEEE
14 years 2 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
DIM
2009
ACM
14 years 12 days ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
COMAD
2009
13 years 8 months ago
Categorizing Concepts for Detecting Drifts in Stream
Mining evolving data streams for concept drifts has gained importance in applications like customer behavior analysis, network intrusion detection, credit card fraud detection. Se...
Sharanjit Kaur, Vasudha Bhatnagar, Sameep Mehta, S...
ENC
2005
IEEE
14 years 1 months ago
SELES: An e-Voting System for Medium Scale Online Elections
— Recent advances in communication networks and cryptographic techniques have made possible to consider online voting systems as a feasible alternative to conventional elections....
Claudia García-Zamora, Francisco Rodr&iacut...