Sciweavers

3162 search results - page 550 / 633
» Transformations for semi-continuous data
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 6 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
96
Voted
ISMIS
2005
Springer
15 years 6 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
120
Voted
PCI
2005
Springer
15 years 6 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
101
Voted
IUI
2004
ACM
15 years 6 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
89
Voted
BIRTHDAY
2004
Springer
15 years 6 months ago
Der 'Nietzsche-Thesaurus' des Nietzsche-Online-Portals
The ‚Nietzsche-Thesaurus’ ist part of an Internet-Portal to the German philosopher Friedrich Nietzsche (under construction). By using the complex Index of a Citation Lexicon (...
Harald Zimmermann