Sciweavers

3420 search results - page 518 / 684
» A Language-Based Approach to Security
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 2 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
115
Voted
ICDAR
2009
IEEE
15 years 11 months ago
Document Analysis Support for the Manual Auditing of Elections
Recent developments have resulted in dramatic changes in the way elections are conducted, both in the United States and around the world. Well-publicized flaws in the security of...
Daniel P. Lopresti, Xiang Zhou, Xiaolei Huang, Gan...
SEFM
2009
IEEE
15 years 11 months ago
Implementation Correctness of a Real-Time Operating System
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
142
Voted
WEBI
2009
Springer
15 years 11 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
CLOUDCOM
2009
Springer
15 years 11 months ago
Accountability as a Way Forward for Privacy Protection in the Cloud
: The issue of how to provide appropriate privacy protection for cloud computing is important, and as yet unresolved. In this paper we propose an approach in which procedural and t...
Siani Pearson, Andrew Charlesworth