Sciweavers

415 search results - page 1 / 83
» Intruders pattern identification
Sort
View
ICPR
2008
IEEE
13 years 12 months ago
Intruders pattern identification
Vito Di Gesù, Giosuè Lo Bosco, Jerom...
ACSAC
2000
IEEE
13 years 10 months ago
A Self-Extension Monitoring for Security Management
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive ...
Heejin Jang, Sangwook Kim
AUSAI
2006
Springer
13 years 9 months ago
Detecting Anomalies and Intruders
Brittleness is a well-known problem in expert systems where a conclusion can be made, which human common sense would recognise as impossible e.g. that a male is pregnant. We have e...
Akara Prayote, Paul Compton
RAID
1999
Springer
13 years 9 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
CCCG
2006
13 years 6 months ago
Characterization of Polygons Searchable by a Boundary 1-Searcher
Suppose intruders are in a dark polygonal room and they can move at a finite but unbounded speed, trying to avoid detection. A boundary 1-searcher can move along the polygon bounda...
Tsunehiko Kameda, John Z. Zhang, Masafumi Yamashit...