Sciweavers

173 search results - page 17 / 35
» Dynamic information source selection for intrusion detection...
Sort
View
RAID
2009
Springer
15 years 4 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
VIZSEC
2005
Springer
15 years 3 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
80
Voted
CHI
2009
ACM
15 years 10 months ago
Learning to predict information needs: context-aware display as a cognitive aid and an assessment tool
We discuss the problem of assessing and aiding user performance in dynamic tasks that require rapid selection among multiple information sources. Motivated by research in human se...
Bradley C. Love, Matt Jones, Marc T. Tomlinson, Mi...
JCM
2006
92views more  JCM 2006»
14 years 9 months ago
Automatic Detection of the Guard Interval Length in OFDM System
Orthogonal Frequency Division Multiplexing (OFDM) has been increasingly used in wireless broadband communication systems. Guard interval (GI) is used in OFDM system to reduce inter...
Li Zou