Sciweavers

Share
8 search results - page 1 / 2
» A Multi-Dimensional Classification for Users of Security Pat...
Sort
View
SIS
2008
8 years 4 months ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
ICANN
2005
Springer
8 years 8 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
CHI
2007
ACM
9 years 3 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2010
ACM
8 years 10 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
IJNSEC
2006
112views more  IJNSEC 2006»
8 years 3 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
books