Sciweavers

579 search results - page 58 / 116
» Towards modeling the traffic data on road networks
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 8 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 3 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
WICON
2008
15 years 3 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
14 years 12 months ago
Towards Community Discovery in Signed Collaborative Interaction Networks
Abstract--We propose a framework for discovery of collaborative community structure in Wiki-based knowledge repositories based on raw-content generation analysis. We leverage topic...
Petko Bogdanov, Nicholas D. Larusso, Ambuj K. Sing...
ACMACE
2009
ACM
15 years 8 months ago
Towards tailoring player experience in physical Wii games: a case study on relaxation
In this study we construct an artificial neural network model of players’ relaxation preferences while playing a physical Wii game. Developed technology will assist game designe...
Patrick Jarnfelt, Sebbe Selvig, Dajana Dimovska