Sciweavers

1875 search results - page 202 / 375
» Modeling the Security of Steganographic Systems
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 4 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
89
Voted
JCS
2002
103views more  JCS 2002»
15 years 9 days ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
CRV
2005
IEEE
305views Robotics» more  CRV 2005»
15 years 6 months ago
3D Model-Assisted Face Recognition in Video
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Unsang Park, Hong Chen, Anil K. Jain
ITP
2010
164views Mathematics» more  ITP 2010»
15 years 4 months ago
Nitpick: A Counterexample Generator for Higher-Order Logic Based on a Relational Model Finder
Nitpick is a counterexample generator for Isabelle/HOL that builds on Kodkod, a SAT-based first-order relational model finder. Nitpick supports unbounded quantification, (co)ind...
Jasmin Christian Blanchette, Tobias Nipkow
82
Voted
OOPSLA
2007
Springer
15 years 6 months ago
CASE-FX: feature modeling support in an OO Case tool
Generative Programming advocates developing a family of systems rather than a set of single systems. Feature modeling can assist in supporting the development of such software pro...
Alain Forget, Dave Arnold, Sonia Chiasson