Sciweavers

531 search results - page 69 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
VIZSEC
2005
Springer
15 years 7 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
WWW
2004
ACM
16 years 2 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
INFOCOM
1997
IEEE
15 years 5 months ago
Proactive Network Fault Detection
The increasing role of communication networks in today’s society results in a demand for higher levels of network availability and reliability. At the same time, fault managemen...
Cynthia S. Hood, Chuanyi Ji
WCE
2007
15 years 2 months ago
Novel Auxiliary Techniques in Clustering
— Clustering is grouping of patterns according to similarity or distance in different perspectives. Various data representations, similarity measurements and organization manners...
Mohammad Taheri, Reza Boostani
ACSAC
2002
IEEE
15 years 6 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell