Sciweavers

1688 search results - page 334 / 338
» Access Control to Information in Pervasive Computing Environ...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
86
Voted
MOBICOM
2010
ACM
14 years 9 months ago
Sybot: an adaptive and mobile spectrum survey system for wifi networks
Information on site-specific spectrum characteristics is essential to evaluate and improve the performance of wireless networks. However, it is usually very costly to obtain accur...
Kyu-Han Kim, Alexander W. Min, Kang G. Shin
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
12 years 12 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
SOSP
2005
ACM
15 years 6 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
CSCW
2010
ACM
15 years 6 months ago
Catchup: a useful application of time-travel in meetings
People are often required to catch up on information they have missed in meetings, because of lateness or scheduling conflicts. Catching up is a complex cognitive process where pe...
Simon Tucker, Ofer Bergman, Anand Ramamoorthy, Ste...