Sciweavers

201 search results - page 21 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
HUC
2009
Springer
15 years 3 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...
MASCOTS
2007
15 years 13 days ago
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
—In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion ...
Antonis Papadogiannakis, Demetres Antoniades, Mich...
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
15 years 4 months ago
ubiES: An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies
Expert systems are originally designed to generate feasible alternatives in automated manner. The users expect the systems to contribute to make decisions proactively and intellig...
Ohbyung Kwon, Keedong Yoo, Euiho Suh
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 5 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
TACAS
2012
Springer
275views Algorithms» more  TACAS 2012»
13 years 6 months ago
Pushdown Model Checking for Malware Detection
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different tec...
Fu Song, Tayssir Touili