Sciweavers

173 search results - page 33 / 35
» Classification of RFID Attacks
Sort
View
CHI
2010
ACM
14 years 27 days ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
CHI
2010
ACM
14 years 27 days ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
ICMCS
2005
IEEE
218views Multimedia» more  ICMCS 2005»
13 years 11 months ago
A Mid-level Visual Concept Generation Framework for Sports Analysis
The development of mid-level concepts helps to bridge the gap between low-level feature and high-level semantics in video analysis. Most existing work combines the customized mid-...
Xiaofeng Tong, Lingyu Duan, Hanqing Lu, Changsheng...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 10 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CHI
2007
ACM
13 years 10 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...