Sciweavers

2269 search results - page 194 / 454
» Behavioral Intrusion Detection
Sort
View
144
Voted
DRM
2006
Springer
15 years 8 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 11 months ago
Paper versus Electronic: Challenges Associated with Physicians' Usage of Electronic Medical Records
This study builds on the theory of planned behavior, institutional and diffusion theories to investigate physicians’ attitudes and usage behaviors of electronic medical records ...
Virginia Ilie, James F. Courtney, Craig Van Slyke
144
Voted
INTERACT
2003
15 years 6 months ago
Be Quiet? Evaluating Proactive and Reactive User Interface Assistants
: This research examined the ability of an anthropomorphic interface assistant to help people learn and use an unfamiliar text-editing tool, with a specific focus on assessing proa...
Jun Xiao, Richard Catrambone, John T. Stasko
CCS
2009
ACM
15 years 11 months ago
A framework for quantitative security analysis of machine learning
We propose a framework for quantitative security analysis of machine learning methods. Key issus of this framework are a formal specification of the deployed learning model and a...
Pavel Laskov, Marius Kloft
ACSAC
2006
IEEE
15 years 11 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...