Sciweavers

2269 search results - page 177 / 454
» Behavioral Intrusion Detection
Sort
View
TSMC
2008
167views more  TSMC 2008»
15 years 4 months ago
A Human-Computer Interface Using Symmetry Between Eyes to Detect Gaze Direction
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the per...
John J. Magee, Margrit Betke, James Gips, M. R. Sc...
127
Voted
DISCEX
2003
IEEE
15 years 10 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
15 years 10 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
ACSAC
2002
IEEE
15 years 10 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
IJNSEC
2006
89views more  IJNSEC 2006»
15 years 4 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara