Sciweavers

6164 search results - page 1182 / 1233
» Teaching Computer Security
Sort
View
152
Voted
RAID
2009
Springer
15 years 9 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
159
Voted
ACMSE
2009
ACM
15 years 9 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
133
Voted
IMC
2009
ACM
15 years 9 months ago
Scalable proximity estimation and link prediction in online social networks
Proximity measures quantify the closeness or similarity between nodes in a social network and form the basis of a range of applications in social sciences, business, information t...
Han Hee Song, Tae Won Cho, Vacha Dave, Yin Zhang, ...
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 9 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
130
Voted
C5
2008
IEEE
15 years 9 months ago
Remote Opportunities: A Rethinking and Retooling
Introducing technology as a sustainable means of creating, connecting, and collaborating introduces the need to carefully consider subtle aspects of deployment strategies and supp...
Yagiz Onat Yazir, Katherine Gunion, Christopher Pe...
« Prev « First page 1182 / 1233 Last » Next »