Sciweavers

414 search results - page 65 / 83
» Secure Border Control Processes
Sort
View
EUROSEC
2010
ACM
15 years 6 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
ACSAC
2005
IEEE
15 years 5 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
CCS
2006
ACM
15 years 3 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...
AGENTS
1998
Springer
15 years 4 months ago
Cognition and Affect: Architectures and Tools
Which agent architectures are capable of justifying descriptions in terms of the `higher level' mental concepts applicable to human beings? We propose a new kind of architect...
Aaron Sloman, Brian Logan
CHI
2004
ACM
16 years 6 days ago
Pointing without a pointer
We present a method for performing selection tasks based on continuous control of multiple, competing agents who try to determine the user's intentions from their control beh...
John Williamson, Roderick Murray-Smith