Sciweavers

1997 search results - page 11 / 400
» A Model for Data Leakage Detection
Sort
View
103
Voted
SERSCISA
2009
Springer
15 years 6 months ago
A Deployment Value Model for Intrusion Detection Sensors
The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different typ...
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Jo...
ITS
2010
Springer
128views Multimedia» more  ITS 2010»
15 years 3 months ago
Can Affect Be Detected from Intelligent Tutoring System Interaction Data? - A Preliminary Study
This study attempted to determine if it is possible to create an automatic affect detector using a combination of semantic and keystroke data. While the resulting models attained d...
Elizabeth A. Anglo, Ma. Mercedes T. Rodrigo
86
Voted
WISEC
2010
ACM
15 years 6 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
JIPS
2006
80views more  JIPS 2006»
14 years 11 months ago
Distance Functions to Detect Changes in Data Streams
: One of the critical issues in a sensor network concerns the detection of changes in data streams. Recently presented change detection schemes primarily use a sliding window model...
Ulziitugs Bud, JongTae Lim
CIDM
2007
IEEE
15 years 6 months ago
A Prototype-driven Framework for Change Detection in Data Stream Classification
This paper presents a prototype-driven framework for classifying evolving data streams. Our framework uses cluster prototypes to summarize the data and to determine whether the cur...
Hamed Valizadegan, Pang-Ning Tan