Sciweavers

8 search results - page 1 / 2
» A Multi-Dimensional Classification for Users of Security Pat...
Sort
View
SIS
2008
13 years 5 months ago
A Multi-Dimensional Classification for Users of Security Patterns
Michael VanHilst, Eduardo B. Fernández, Fab...
ICANN
2005
Springer
13 years 9 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
CHI
2007
ACM
14 years 4 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2010
ACM
13 years 10 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
IJNSEC
2006
112views more  IJNSEC 2006»
13 years 3 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao