Sciweavers

96 search results - page 13 / 20
» expert 1998
Sort
View
RC
1998
41views more  RC 1998»
13 years 7 months ago
Estimating Uncertainties for Geophysical Tomography
We present statistical and interval techniques for evaluating the uncertainties associated with geophysical tomographic inversion problems, including estimation of data errors, mo...
Diane I. Doser, Kevin D. Crain, Mark R. Baker, Vla...
ISN
1998
Springer
13 years 11 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 12 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ACSD
1998
IEEE
105views Hardware» more  ACSD 1998»
13 years 12 months ago
Visual Formalisms Revisited
The development of an interactive application is a complex task that has to consider data, behavior, intercommunication, architecture and distribution aspects of the modeled syste...
Radu Grosu, Gheorghe Stefanescu, Manfred Broy
ICNP
1998
IEEE
13 years 12 months ago
Statistical Anomaly Detection for Link-State Routing Protocols
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the imple...
D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyht...