Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,680 Hits in 5.0 sec

Efficient application identification and the temporal and spatial stability of classification schema

Wei Li, Marco Canini, Andrew W. Moore, Raffaele Bolla
2009 Computer Networks  
In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification  ...  We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP.  ...  Table 16 Per-class and general accuracy for temporal and spatial evaluation of the UDP models trained with C4.5.  ... 
doi:10.1016/j.comnet.2008.11.016 fatcat:4hjx3hfaxvckfoa6odvfvtuyga

Towards Building a Masquerade Detection Method Based on User File System Navigation [chapter]

Benito Camiña, Raúl Monroy, Luis A. Trejo, Erika Sánchez
2011 Lecture Notes in Computer Science  
Schonlau's group have yielded a masquerade dataset, which has been the standard for comparing masquerade detection methods.  ...  However, the performance of these methods is not conclusive, and, as a result, research on masquerade detection has resorted to other sources of information for profiling user behaviour.  ...  Fig. 2 . 2 ROC curve: masquerade detection results Fig. 3 . 3 Spatial Locality of reference for user 3 Fig. 4 . 4 Object creation rate when intruder 1 is masquerading user 3 Given that u is understood  ... 
doi:10.1007/978-3-642-25324-9_15 fatcat:fzo4aa35cvhqppscz3bz54zsje

Table of contents

2016 IEEE Transactions on Information Forensics and Security  
Alhalabi 1984 Temporal and Spatial Locality: An Abstraction for Masquerade Detection .................................................. ............................................................ J.  ...  Wu 2052 Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation ........................... ............................................................................  ... 
doi:10.1109/tifs.2016.2579579 fatcat:rkc5uiczczhbfhbpihcj7xxpmy

Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection

José Benito Camiña, Miguel Angel Medina-Pérez, Raúl Monroy, Octavio Loyola-González, Luis Angel Pereyra Villanueva, Luis Carlos González Gurrola
2018 Machine Vision and Applications  
In this paper, we propose a novel classification ensemble for file access-based masquerade detection.  ...  We have successfully validated the hypothesis that a one-class classification approach to file access-based masquerade detection outperforms a multi-class one.  ...  Acknowledgements We wish to express our gratitude to the members of the GIEE-ML group at Tecnológico de Monterrey for providing useful suggestions and advice on earlier versions of this paper.  ... 
doi:10.1007/s00138-018-0957-4 fatcat:pws7wln4t5hhha52w3c4fkvl4m

I/O Sharing in a Multi-core Kernel for Mixed-Criticality Applications [chapter]

Gang Li, Søren Top
2013 IFIP Advances in Information and Communication Technology  
In the partitioning architecture of strong spatial and temporal isolation, fault propagation can be prevented among mixed-criticality applications (regarded as partitions).  ...  In a mixed-criticality system, applications with different safety criticality levels are usually required to be implemented upon one platform for several reasons( reducing hardware cost, space, power consumption  ...  Protection shall be provided to message-based communication for detecting message transmission delay, ensuring temporal behaviour. 4.  ... 
doi:10.1007/978-3-642-38853-8_30 fatcat:mocuz6vpbva2tcugpvjypaeive

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure

B. B. Gupta, Shingo Yamaguchi, Zhiyong Zhang, Konstantinos E. Psannis
2018 Multimedia tools and applications  
In recent years, cyber security and privacy is an essential need for modern society where information technology and services pervade every aspect of our lives.  ...  awareness and its best practices for the real world and also emphasizes many open questions [3, 10, 11, 13, 15] .  ...  a video abstract system based on spatial-temporal neighborhood trajectory analysis algorithm which is mainly used to process surveillance videos is proposed.  ... 
doi:10.1007/s11042-018-6426-2 fatcat:jfuzcmb62fh3vajha3vdttj4km

Sequence alignment for masquerade detection

Scott E. Coull, Boleslaw K. Szymanski
2008 Computational Statistics & Data Analysis  
Furthermore, both methods assert that the spatial locality of commands is an important feature of command sequences.  ...  This method, however, relies heavily on the temporal locality of metrics, and therefore may miss high-level patterns that may emerge over time.  ... 
doi:10.1016/j.csda.2008.01.022 fatcat:4skgi2qkf5avfenhzerk5s55l4

The influence of motion-defined form on the perception of spatially-defined form

Stéphane J.M. Rainville, Hugh R. Wilson
2004 Vision Research  
We argue these results cannot be explained by local neural interactions between spatial and motion cues and propose instead that data reflect higher-level interactions between separate visual pathways  ...  encoding spatial-form and motionform.  ...  Acknowledgements We thank anonymous reviewers for their suggestions and Gunter Loeffler for useful discussions on this work.  ... 
doi:10.1016/j.visres.2004.01.003 pmid:15050812 fatcat:kquwbnyz3najpcwbsxm2mpkeia

A Fault Hypothesis for Integrated Architectures

R. Obermaisser
2006 2006 International Workshop on Intelligent Solutions in Embedded Systems  
The basic idea is the differentiation of fault containment regions for software and for hardware faults.  ...  This node-centric view is characteristic for federated systems and encompasses no discrimination between hardware and software faults.  ...  IST-004527 and the European IST project DECOS under project No. IST-511764.  ... 
doi:10.1109/wises.2006.237001 fatcat:qckdoibxarbvdizzcu6jf7gl3i

A Fault Hypothesis for Integrated Architectures

R. Obermaisser, P. Peti
2006 2006 International Workshop on Intelligent Solutions in Embedded Systems  
The basic idea is the differentiation of fault containment regions for software and for hardware faults.  ...  This node-centric view is characteristic for federated systems and encompasses no discrimination between hardware and software faults.  ...  IST-004527 and the European IST project DECOS under project No. IST-511764.  ... 
doi:10.1109/wises.2006.329115 dblp:conf/wises/ObermaisserP06 fatcat:saxit5brevagdpd2gkzlhwcjgm

Spatio-temporal Data Mining for Climate Data: Advances, Challenges, and Opportunities [chapter]

James H. Faghmous, Vipin Kumar
2014 Studies in Big Data  
In this chapter, we refer to spatio-temporal data mining (STDM) as a collection of methods that mine the data's spatio-temporal context to increase an algorithm's accuracy, scalability, or interpretability  ...  We highlight some of the singular characteristics and challenges STDM faces within climate data and their applications, and provide the reader with an overview of the advances in STDM and related climate  ...  Fellowship, and an NSF Expeditions in Computing Grant (IIS-1029711).  ... 
doi:10.1007/978-3-642-40837-3_3 fatcat:lwtojz5baza2bjbhzwycpwnpty

Argentina after the "Dirty War": Reading the Limits of National Reconciliation

Mario Di Paolantonio
1997 Alternatives: Global, Local, Political  
Consequently, the thesis will ask what does this reading of the limits imply for the writing and transmission of history.  ...  This concem with what has been excluded or repressed by the legal-narrative of the event, points to an ethical reading practice which is ≤ to read the limits of representation.  ...  usion which are implicated in an abstract apped to the "we" who share (Corne11 1992:35) .  ... 
doi:10.1177/030437549702200401 fatcat:q2ksvoowibhdvd4jclegdhtpxa

Biological image motion processing: A review

Ken Nakayama
1985 Vision Research  
Parallel and serial processing within an early motion system: a skeletal model Random dot stimuli D ImAX Dm,  ...  pattern vision (7) Image motion processing as useful for perceiving real moving objects Multiplicity of functional roles Motion blindness?  ...  T hais their maximum sensitivity oriented alonp these constant velocity lines and thus appear to represent a higher order process. abstracting Lelocity despite rather major variations of spatial and temporal  ... 
doi:10.1016/0042-6989(85)90171-3 pmid:3895725 fatcat:fbyrcamgfjautc5nnoeuk7afgm

Fault and Error Containment of Gateways in Distributed Real-Time Systems

Roman Obermaisser
2009 Journal of Software  
The real-time database facilitates fault and error containment by temporally decoupling clusters.  ...  The proposed solution is experimentally evaluated in an example system with a time-triggered Ethernet network and a Controller Area Network (CAN).  ...  The types of detectable timing failures depend on the corresponding Figure 4 depicts an example for temporal partitioning in the feeder network adaptor for an event-triggered protocol.  ... 
doi:10.4304/jsw.4.7.686-695 fatcat:znzm2x3xqzgkhpixzg2qoxcfo4

Dynamic security reconfiguration for the semantic web

J TAN, S POSLAD
2004 Engineering applications of artificial intelligence  
This paper describes a meta-reasoning model for semantic open service environments, an application and an evaluation of the framework and its performance. r  ...  These standards support different security requirements and use various syntaxes to represent the security information for different software infrastructures and applications.  ...  Inputs are received through the monitoring of spatial and temporal information from the local domain knowledge.  ... 
doi:10.1016/s0952-1976(04)00118-6 fatcat:fnd2pzwctncxrb5zhug5yf4jri
« Previous Showing results 1 — 15 out of 1,680 results