Sciweavers

2236 search results - page 90 / 448
» Intrusion detection techniques and approaches
Sort
View
UIST
2006
ACM
15 years 3 months ago
Camera phone based motion sensing: interaction techniques, applications and performance study
This paper presents TinyMotion, a pure software approach for detecting a mobile phone user’s hand movement in real time by analyzing image sequences captured by the built-in cam...
Jingtao Wang, Shumin Zhai, John F. Canny
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 2 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
SOQUA
2007
14 years 11 months ago
An approach to detecting failures automatically
Failure detection is a difficult and often expensive task. The principle of self-healing addresses this cost issue, but poses new research questions. This work focuses on detectin...
Jochen Wuttke
GD
2008
Springer
14 years 11 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...