Sciweavers

16 search results - page 1 / 4
» Topological Analysis of Multi-phase Attacks using Expert Sys...
Sort
View
JISE
2008
59views more  JISE 2008»
13 years 4 months ago
Topological Analysis of Multi-phase Attacks using Expert Systems
Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool J...
EXPERT
2010
145views more  EXPERT 2010»
13 years 2 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
INFSOF
2007
83views more  INFSOF 2007»
13 years 4 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
IJCNN
2000
IEEE
13 years 9 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
ACSAC
2003
IEEE
13 years 10 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt