Sciweavers

335 search results - page 61 / 67
» Biometrics and Security
Sort
View
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 5 months ago
Displaying Aggregate Data, Interrelated Quantities, and Data Trends in Electric Power Systems
This paper describes a number of effective techniques for visualizing some of the more complex data relationships that characterize an electric power system in real time. Power sy...
Ray Klump, Warren Wu, Greg Dooley
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 5 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 5 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 5 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 4 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...