Sciweavers

6164 search results - page 986 / 1233
» Teaching Computer Security
Sort
View
ICCS
2005
Springer
15 years 10 months ago
ACCESS: An Agent Based Architecture for the Rapid Prototyping of Location Aware Services
We describe the Agents Channelling ContExt Sensitive Services (ACCESS) architecture, an open agent-based architecture that supports the development and deployment of multiple heter...
Robin Strahan, Gregory M. P. O'Hare, Conor Muldoon...
ISI
2005
Springer
15 years 10 months ago
Modeling and Multiway Analysis of Chatroom Tensors
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications data, and establishes a link betwe...
Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. ...
ISI
2005
Springer
15 years 10 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
ISNN
2005
Springer
15 years 10 months ago
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
As a crucial issue in computer network security, anomaly detection is receiving more and more attention from both application and theoretical point of view. In this paper, a novel ...
Hanghang Tong, Chongrong Li, Jingrui He, Jiajian C...
ISVC
2005
Springer
15 years 10 months ago
Mining Paths of Complex Crowd Scenes
The Ambient Intelligence (AmI) paradigm requires a robust interpretation of people actions and behaviour and a way for automatically generating persistent spatial-temporal models o...
Beibei Zhan, Paolo Remagnino, Sergio A. Velastin