Sciweavers

452 search results - page 37 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
DSN
2006
IEEE
15 years 3 months ago
User Interface Defect Detection by Hesitation Analysis
Delays and errors are the frequent consequences of people having difficulty with a user interface. Such delays and errors can result in severe problems, particularly for mission-...
Robert W. Reeder, Roy A. Maxion
KI
2009
Springer
15 years 4 months ago
P300 Detection Based on Feature Extraction in On-line Brain-Computer Interface
Abstract. We propose a new EEG-based wireless brain computer interface (BCI) with which subjects can “mind-type” text on a computer screen. The application is based on detectin...
Nikolay Chumerin, Nikolay V. Manyakov, Adrien Comb...
ACSAC
1998
IEEE
15 years 2 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
NDSS
2007
IEEE
15 years 4 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
ESTIMEDIA
2006
Springer
15 years 1 months ago
A Communication Interface for Multiprocessor Signal Processing Systems
Parallelization of embedded software is often desirable for power/performance-related considerations for computation-intensive applications that frequently occur in the signal-pro...
Sankalita Saha, Shuvra S. Bhattacharyya, Wayne Wol...