Sciweavers

2236 search results - page 125 / 448
» Intrusion detection techniques and approaches
Sort
View
CN
2007
91views more  CN 2007»
14 years 10 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
IC3
2009
14 years 8 months ago
Local Subspace Based Outlier Detection
Abstract. Existing studies in outlier detection mostly focus on detecting outliers in full feature space. But most algorithms tend to break down in highdimensional feature spaces b...
Ankur Agrawal
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
15 years 3 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
APCCM
2006
14 years 11 months ago
Network data mining: methods and techniques for discovering deep linkage between attributes
Network Data Mining identifies emergent networks between myriads of individual data items and utilises special algorithms that aid visualisation of `emergent' patterns and tre...
John Galloway, Simeon J. Simoff
99
Voted
INFSOF
2007
104views more  INFSOF 2007»
14 years 10 months ago
A state-based approach to integration testing based on UML models
: Correct functioning of object-oriented software depends upon the successful integration of classes. While individual classes may function correctly, several new faults can arise ...
Shaukat Ali, Lionel C. Briand, Muhammad Jaffar-Ur ...