A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient application identification and the temporal and spatial stability of classification schema
2009
Computer Networks
In a unique study in both the spatial-domain: comparing across different network-locations and in the temporal-domain: comparing across a number of years of data, we illustrate the decay in classification ...
We use the same classification approach for both stateful flows (TCP) and stateless flows based upon UDP. ...
Table 16 Per-class and general accuracy for temporal and spatial evaluation of the UDP models trained with C4.5. ...
doi:10.1016/j.comnet.2008.11.016
fatcat:4hjx3hfaxvckfoa6odvfvtuyga
Towards Building a Masquerade Detection Method Based on User File System Navigation
[chapter]
2011
Lecture Notes in Computer Science
Schonlau's group have yielded a masquerade dataset, which has been the standard for comparing masquerade detection methods. ...
However, the performance of these methods is not conclusive, and, as a result, research on masquerade detection has resorted to other sources of information for profiling user behaviour. ...
Fig. 2 . 2 ROC curve: masquerade detection results
Fig. 3 . 3 Spatial Locality of reference for user 3
Fig. 4 . 4 Object creation rate when intruder 1 is masquerading user 3
Given that u is understood ...
doi:10.1007/978-3-642-25324-9_15
fatcat:fzo4aa35cvhqppscz3bz54zsje
Table of contents
2016
IEEE Transactions on Information Forensics and Security
Alhalabi 1984 Temporal and Spatial Locality: An Abstraction for Masquerade Detection .................................................. ............................................................ J. ...
Wu 2052 Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation ........................... ............................................................................ ...
doi:10.1109/tifs.2016.2579579
fatcat:rkc5uiczczhbfhbpihcj7xxpmy
Bagging-RandomMiner: a one-class classifier for file access-based masquerade detection
2018
Machine Vision and Applications
In this paper, we propose a novel classification ensemble for file access-based masquerade detection. ...
We have successfully validated the hypothesis that a one-class classification approach to file access-based masquerade detection outperforms a multi-class one. ...
Acknowledgements We wish to express our gratitude to the members of the GIEE-ML group at Tecnológico de Monterrey for providing useful suggestions and advice on earlier versions of this paper. ...
doi:10.1007/s00138-018-0957-4
fatcat:pws7wln4t5hhha52w3c4fkvl4m
I/O Sharing in a Multi-core Kernel for Mixed-Criticality Applications
[chapter]
2013
IFIP Advances in Information and Communication Technology
In the partitioning architecture of strong spatial and temporal isolation, fault propagation can be prevented among mixed-criticality applications (regarded as partitions). ...
In a mixed-criticality system, applications with different safety criticality levels are usually required to be implemented upon one platform for several reasons( reducing hardware cost, space, power consumption ...
Protection shall be provided to message-based communication for detecting message transmission delay, ensuring temporal behaviour. 4. ...
doi:10.1007/978-3-642-38853-8_30
fatcat:mocuz6vpbva2tcugpvjypaeive
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure
2018
Multimedia tools and applications
In recent years, cyber security and privacy is an essential need for modern society where information technology and services pervade every aspect of our lives. ...
awareness and its best practices for the real world and also emphasizes many open questions [3, 10, 11, 13, 15] . ...
a video abstract system based on spatial-temporal neighborhood trajectory analysis algorithm which is mainly used to process surveillance videos is proposed. ...
doi:10.1007/s11042-018-6426-2
fatcat:jfuzcmb62fh3vajha3vdttj4km
Sequence alignment for masquerade detection
2008
Computational Statistics & Data Analysis
Furthermore, both methods assert that the spatial locality of commands is an important feature of command sequences. ...
This method, however, relies heavily on the temporal locality of metrics, and therefore may miss high-level patterns that may emerge over time. ...
doi:10.1016/j.csda.2008.01.022
fatcat:4skgi2qkf5avfenhzerk5s55l4
The influence of motion-defined form on the perception of spatially-defined form
2004
Vision Research
We argue these results cannot be explained by local neural interactions between spatial and motion cues and propose instead that data reflect higher-level interactions between separate visual pathways ...
encoding spatial-form and motionform. ...
Acknowledgements We thank anonymous reviewers for their suggestions and Gunter Loeffler for useful discussions on this work. ...
doi:10.1016/j.visres.2004.01.003
pmid:15050812
fatcat:kquwbnyz3najpcwbsxm2mpkeia
A Fault Hypothesis for Integrated Architectures
2006
2006 International Workshop on Intelligent Solutions in Embedded Systems
The basic idea is the differentiation of fault containment regions for software and for hardware faults. ...
This node-centric view is characteristic for federated systems and encompasses no discrimination between hardware and software faults. ...
IST-004527 and the European IST project DECOS under project No. IST-511764. ...
doi:10.1109/wises.2006.237001
fatcat:qckdoibxarbvdizzcu6jf7gl3i
A Fault Hypothesis for Integrated Architectures
2006
2006 International Workshop on Intelligent Solutions in Embedded Systems
The basic idea is the differentiation of fault containment regions for software and for hardware faults. ...
This node-centric view is characteristic for federated systems and encompasses no discrimination between hardware and software faults. ...
IST-004527 and the European IST project DECOS under project No. IST-511764. ...
doi:10.1109/wises.2006.329115
dblp:conf/wises/ObermaisserP06
fatcat:saxit5brevagdpd2gkzlhwcjgm
Spatio-temporal Data Mining for Climate Data: Advances, Challenges, and Opportunities
[chapter]
2014
Studies in Big Data
In this chapter, we refer to spatio-temporal data mining (STDM) as a collection of methods that mine the data's spatio-temporal context to increase an algorithm's accuracy, scalability, or interpretability ...
We highlight some of the singular characteristics and challenges STDM faces within climate data and their applications, and provide the reader with an overview of the advances in STDM and related climate ...
Fellowship, and an NSF Expeditions in Computing Grant (IIS-1029711). ...
doi:10.1007/978-3-642-40837-3_3
fatcat:lwtojz5baza2bjbhzwycpwnpty
Argentina after the "Dirty War": Reading the Limits of National Reconciliation
1997
Alternatives: Global, Local, Political
Consequently, the thesis will ask what does this reading of the limits imply for the writing and transmission of history. ...
This concem with what has been excluded or repressed by the legal-narrative of the event, points to an ethical reading practice which is ≤ to read the limits of representation. ...
usion which are implicated in an abstract apped to the "we" who share (Corne11 1992:35) . ...
doi:10.1177/030437549702200401
fatcat:q2ksvoowibhdvd4jclegdhtpxa
Biological image motion processing: A review
1985
Vision Research
Parallel and serial processing within an early motion system: a skeletal model Random dot stimuli D ImAX Dm, ...
pattern vision (7) Image motion processing as useful for perceiving real moving objects Multiplicity of functional roles Motion blindness? ...
T hais their maximum sensitivity oriented alonp these constant velocity lines and thus appear to represent a higher order process. abstracting Lelocity despite rather major variations of spatial and temporal ...
doi:10.1016/0042-6989(85)90171-3
pmid:3895725
fatcat:fbyrcamgfjautc5nnoeuk7afgm
Fault and Error Containment of Gateways in Distributed Real-Time Systems
2009
Journal of Software
The real-time database facilitates fault and error containment by temporally decoupling clusters. ...
The proposed solution is experimentally evaluated in an example system with a time-triggered Ethernet network and a Controller Area Network (CAN). ...
The types of detectable timing failures depend on the corresponding Figure 4 depicts an example for temporal partitioning in the feeder network adaptor for an event-triggered protocol. ...
doi:10.4304/jsw.4.7.686-695
fatcat:znzm2x3xqzgkhpixzg2qoxcfo4
Dynamic security reconfiguration for the semantic web
2004
Engineering applications of artificial intelligence
This paper describes a meta-reasoning model for semantic open service environments, an application and an evaluation of the framework and its performance. r ...
These standards support different security requirements and use various syntaxes to represent the security information for different software infrastructures and applications. ...
Inputs are received through the monitoring of spatial and temporal information from the local domain knowledge. ...
doi:10.1016/s0952-1976(04)00118-6
fatcat:fnd2pzwctncxrb5zhug5yf4jri
« Previous
Showing results 1 — 15 out of 1,680 results