Sciweavers

7 search results - page 1 / 2
» An Opinion Model for Evaluating Malicious Activities in Perv...
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 5 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
IWCMC
2006
ACM
13 years 9 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
CCS
2010
ACM
13 years 3 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
PERVASIVE
2011
Springer
12 years 6 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
PERVASIVE
2007
Springer
13 years 9 months ago
Interstitial Interfaces for Mobile Media
Mobile devices make ideal personal ambient information systems given their ubiquitous adoption by users and their rich context knowledge of users’ activity. However, we believe ...
Jehan Wickramasuriya, Venu Vasudevan, Nitya Narasi...