Sciweavers

12183 search results - page 158 / 2437
» Computers under Attacks!
Sort
View
121
Voted
TITS
2008
133views more  TITS 2008»
15 years 4 months ago
Fuzzy Control Model Optimization for Behavior-Consistent Traffic Routing Under Information Provision
This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behaviorconsistent (BC) information-based control strategies to improve the...
Alexander Paz, Srinivas Peeta
ICPR
2010
IEEE
15 years 2 months ago
Verification Under Increasing Dimensionality
Verification decisions are often based on second order statistics estimated from a set of samples. Ongoing growth of computational resources allows for considering more and more fe...
Anne Hendrikse, Raymond N. J. Veldhuis, Luuk J. Sp...
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 5 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
ICDCSW
2008
IEEE
15 years 11 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
IPPS
2007
IEEE
15 years 11 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski