Sciweavers

80 search results - page 1 / 16
» Using Feedback to Improve Masquerade Detection
Sort
View
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
13 years 10 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung
DSN
2003
IEEE
13 years 10 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
DSN
2002
IEEE
13 years 10 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
ICASSP
2011
IEEE
12 years 8 months ago
Improved spoken term detection using support vector machines based on lattice context consistency
We propose an improved spoken term detection approach that uses support vector machines trained with lattice context consistency. The basic idea is that the same term usually have...
Hung-yi Lee, Tsung-wei Tu, Chia-Ping Chen, Chao-Yu...
PIMRC
2010
IEEE
13 years 2 months ago
Improving link failure detection and response in IEEE 802.11 wireless ad hoc networks
Wireless multihop ad hoc networks face a multitude of challenging problems including highly dynamic multihop topologies, lossy and noisy communications channels, and sporadic conne...
Alvin C. Valera, Hwee-Pink Tan, Winston Khoon Guan...