Sciweavers

6164 search results - page 1139 / 1233
» Teaching Computer Security
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 8 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
RTCSA
2003
IEEE
15 years 8 months ago
Zero-Stop Authentication: Sensor-Based Real-Time Authentication System
Abstract. This paper proposes “Zero-stop Authentication” system, which requires no intentional interactions between users and authentication applications. Our Zero-stop Authent...
Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuk...
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
15 years 8 months ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...
WMCSA
2003
IEEE
15 years 8 months ago
Web Services on Mobile Devices - Implementation and Experience
Web Services have started to appear on servers as interfaces between business-to-business applications. To date, mobile devices have only consumed Web Services running on stationa...
Stefan Berger, Scott McFaddin, Chandrasekhar Naray...
123
Voted
SENSYS
2003
ACM
15 years 8 months ago
Differentiated surveillance for sensor networks
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing...
Ting Yan, Tian He, John A. Stankovic
« Prev « First page 1139 / 1233 Last » Next »