Sciweavers

878 search results - page 55 / 176
» A Compiler-Based Approach to Data Security
Sort
View
SAC
2004
ACM
15 years 9 months ago
Towards multisensor data fusion for DoS detection
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...
Christos Siaterlis, Basil S. Maglaris
ESORICS
2009
Springer
16 years 4 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
136
Voted
SP
2002
IEEE
128views Security Privacy» more  SP 2002»
15 years 3 months ago
Fitting hidden Markov models to psychological data
Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive stat...
Ingmar Visser, Maartje E. J. Raijmakers, Peter C. ...
CSREASAM
2006
15 years 5 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
101
Voted
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
15 years 10 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...