Sciweavers

1013 search results - page 191 / 203
» Intrusion detection
Sort
View
IEEEARES
2009
IEEE
15 years 4 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
AUIC
2006
IEEE
15 years 4 months ago
Garment-based body sensing using foam sensors
Wearable technology is omnipresent to the user. Thus, it has the potential to be significantly disruptive to the user’s daily life. Context awareness and intuitive device interf...
Lucy E. Dunne, Sarah Brady, Richard Tynan, Kim Lau...
ACSAC
2005
IEEE
15 years 3 months ago
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
Steven Noel, Sushil Jajodia
ATC
2009
Springer
15 years 1 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
CVIU
2011
14 years 4 months ago
A wearable gaze tracking system for children in unconstrained environments
We present here a head-mounted gaze tracking system for the study of visual behavior in unconstrained environments. The system is designed both for adults and for infants as young...
Basilio Noris, Jean-Baptiste Keller, Aude Billard