Sciweavers

452 search results - page 45 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
RIVF
2007
14 years 11 months ago
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference
— In this work we present the principles and experimental demonstration of a BB84 Quantum Key Distribution (QKD) one way system using fainted pulses and a Quadrature Phase-Shift-...
Qing Xu 0006, M. B. C. Silva, Jean-Luc Danger, Syl...
ICDE
2012
IEEE
273views Database» more  ICDE 2012»
13 years 5 days ago
Data3 - A Kinect Interface for OLAP Using Complex Event Processing
—Motion sensing input devices like Microsoft’s Kinect offer an alternative to traditional computer input devices like keyboards and mouses. Daily new applications using this in...
Steffen Hirte, Andreas Seifert, Stephan Baumann, D...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 9 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
CCS
2008
ACM
14 years 11 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...