Sciweavers

16 search results - page 1 / 4
» The Stakkato Intrusions: What Happened and What Have We Lear...
Sort
View
ECTEL
2008
Springer
13 years 6 months ago
e-Learning in Higher Education: Searching for a Model of Curriculum Analysis
The main purpose behind the design of this experience is the idea of obtaining useful information to know how the online courses in our University have been developed, and trying t...
Linda J. Castaneda
TIFS
2008
154views more  TIFS 2008»
13 years 4 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen

Book
1331views
15 years 3 months ago
Spatial Reasoning: Theory and Practice
"Spatial structures and spatial reasoning are essential to perception and cognition. Much day-to-day practical information is about what happens at certain spatial locations....
M. Aiello
ICETE
2004
253views Business» more  ICETE 2004»
13 years 6 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong