-
1
-
-
33745907062
-
The Trouble with Login: On Usability and Computer Security in Ubiquitous Computing
-
E. Bardram, "The Trouble with Login: On Usability and Computer Security in Ubiquitous Computing," Personal Ubiquitous Comput., vol. 9, no. 6, pp. 357-367, 2005.
-
(2005)
Personal Ubiquitous Comput.
, vol.9
, Issue.6
, pp. 357-367
-
-
Bardram, E.1
-
2
-
-
35248861348
-
Dependability Issues of Pervasive Computing in a Healthcare Environment
-
Springer Berlin / Heidelberg
-
Jürgen Bohn, Felix Gärtner and Harald Vogt, "Dependability Issues of Pervasive Computing in a Healthcare Environment," in Security in Pervasive Computing. Springer Berlin / Heidelberg, 2004.
-
(2004)
Security in Pervasive Computing
-
-
Bohn, J.1
Gärtner, F.2
Vogt, H.3
-
3
-
-
59249099446
-
-
Auerbach Publications, CRC Press, ch. Security Solutions for Pervasive Healthcare
-
K. Venkatasubramanian and S. K. Gupta, In Security in Distributed, Grid, Mobile, and Pervasive Computing. Auerbach Publications, CRC Press, 2007, ch. Security Solutions for Pervasive Healthcare, pp. 443-464.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 443-464
-
-
Venkatasubramanian, K.1
Gupta, S.K.2
-
4
-
-
0023294428
-
Intrusion-Detection Model
-
D. E. Denning, "Intrusion-Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
5
-
-
24944433030
-
Security for Ubiquitous Computing
-
ICISC, C. Park and S. Chee, Eds., Springer
-
F. Stajano, "Security for Ubiquitous Computing," in ICISC, ser. Lecture Notes in Computer Science, C. Park and S. Chee, Eds., vol. 3506. Springer, 2004, p. 2.
-
(2004)
Ser. Lecture Notes in Computer Science
, vol.3506
, pp. 2
-
-
Stajano, F.1
-
6
-
-
79957614136
-
NetHost-Sensor: A Novel Concept in Intrusion Detection Systems
-
Washington, DC, USA: IEEE Computer Society
-
A. Abimbola, Q. Shi, and M. Merabti, "NetHost-Sensor: A Novel Concept in Intrusion Detection Systems," in ISCC '03. Washington, DC, USA: IEEE Computer Society, 2003, p. 232.
-
(2003)
ISCC '03
, pp. 232
-
-
Abimbola, A.1
Shi, Q.2
Merabti, M.3
-
7
-
-
0023294428
-
An Intrusion-Detection Model
-
D. E. Denning, "An Intrusion-Detection Model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
8
-
-
85090433665
-
Snort - Lightweight Intrusion Detection for Networks
-
Berkeley, CA, USA: USENIX Association
-
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," in LISA. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238.
-
(1999)
LISA
, pp. 229-238
-
-
Roesch, M.1
-
9
-
-
1542286890
-
Designing and Implementing a Family of Intrusion Detection Systems
-
New York, NY, USA: ACM
-
G. Vigna, F. Valeur, and R. A. Kemmerer, "Designing and Implementing a Family of Intrusion Detection Systems," in ESEC/FSE-11. New York, NY, USA: ACM, 2003, pp. 88-97.
-
(2003)
ESEC/FSE-11
, pp. 88-97
-
-
Vigna, G.1
Valeur, F.2
Kemmerer, R.A.3
-
10
-
-
2442449499
-
Applications of Context-Aware Computing in Hospital Work - Examples and Design Principles
-
ACM Press
-
J. E. Bardram, "Applications of Context-Aware Computing in Hospital Work - Examples and Design Principles," in Proceedings of the 2004 ACM Symposium on Applied Computing. ACM Press, 2004, pp. 1574-1579.
-
(2004)
Proceedings of the 2004 ACM Symposium on Applied Computing
, pp. 1574-1579
-
-
Bardram, J.E.1
-
11
-
-
34548725499
-
A Survey on Context-Aaware Systems
-
M. Baldauf, S. Dustdar, and F. Rosenberg, "A Survey on Context-Aaware Systems," Int. J. Ad Hoc Ubiquitous Comput., vol. 2, no. 4, pp. 263-277, 2007.
-
(2007)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.2
, Issue.4
, pp. 263-277
-
-
Baldauf, M.1
Dustdar, S.2
Rosenberg, F.3
-
12
-
-
0002973626
-
Using Pervasive Computing to Deliver Elder Care
-
V. Stanford, "Using Pervasive Computing to Deliver Elder Care," IEEE Pervasive Computing, vol. 1, no. 1, pp. 10-13, 2002.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.1
, pp. 10-13
-
-
Stanford, V.1
-
14
-
-
0348011360
-
Pervasive Healthcare
-
U. Varshney, "Pervasive Healthcare," IEEE Computer, vol. 36, no. 12, pp. 138-140, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.12
, pp. 138-140
-
-
Varshney, U.1
-
16
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
RIAD, Springer
-
Ke Wang and Salvatore J. Stolfo, "Anomalous payload-based network intrusion detection," in RIAD, ser. Lecture Notes in Computer Science. Springer, 2004, pp. 203-222.
-
(2004)
Ser. Lecture Notes in Computer Science
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
17
-
-
27144475340
-
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
-
Salvatore J. Stolfo and Frank Apap and Eleazar Eskin and Katherine Heller and Shlomo Hershkop and Andrew Honig and Krysta Marie Svore, "A comparative evaluation of two algorithms for Windows Registry Anomaly Detection," Journal of Computer Security, vol. 13, no. 4, pp. 659-693, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 659-693
-
-
Stolfo, S.J.1
Apap, F.2
Eskin, E.3
Heller, K.4
Hershkop, S.5
Honig, A.6
Svore, K.M.7
-
18
-
-
84940110274
-
Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)
-
IEEE Computer Society
-
U. Lindqvist and P. A. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," in S & P. IEEE Computer Society, 1999.
-
(1999)
S & P
-
-
Lindqvist, U.1
Porras, P.A.2
-
21
-
-
44649150596
-
A bayesian networks in intrusion detection systems
-
A. A. M. Mehdi, S. Zair and M. Bensebti, "A bayesian networks in intrusion detection systems," Journal of Computer Science, vol. 3, no. 5, 2007.
-
(2007)
Journal of Computer Science
, vol.3
, Issue.5
-
-
Mehdi, A.A.M.1
Zair, S.2
Bensebti, M.3
-
22
-
-
33644780888
-
A process-mining Framework for the Detection of Healthcare Fraud and Abuse
-
W.-S. Yang, , and S.-Y. Hwang, "A process-mining Framework for the Detection of Healthcare Fraud and Abuse," Expert Systems with Applications, vol. 31, pp. 56-68, 2006.
-
(2006)
Expert Systems with Applications
, vol.31
, pp. 56-68
-
-
Yang, W.-S.1
Hwang, S.-Y.2
-
24
-
-
79957617103
-
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
-
G. A. R. Pedro A. Ortega, Cristian J. Figueroa, "A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile," in DMIN'06. The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, 2006, pp. 224-231.
-
(2006)
DMIN'06. The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing
, pp. 224-231
-
-
Ortega, G.A.R.P.A.1
Figueroa, C.J.2
-
25
-
-
0002784345
-
Algorithms for association rule mining - A general survey and comparison
-
Hipp, Jochen and Güntzer, Ulrich and Nakhaeizadeh, Gholamreza, "Algorithms for association rule mining - a general survey and comparison," SIGKDD Explor. News, vol. 2, no. 1, pp. 58-64, 2000.
-
(2000)
SIGKDD Explor. News
, vol.2
, Issue.1
, pp. 58-64
-
-
Hipp, J.1
Güntzer, U.2
Nakhaeizadeh, G.3
-
27
-
-
2942735553
-
Odam: An optimized distributed association rule mining algorithm
-
March
-
K. S. Mafruz Zaman Ashrafi, David Taniar, "Odam: An optimized distributed association rule mining algorithm," IEEE Distributed Systems Online, vol. 5, no. 3, March 2004.
-
(2004)
IEEE Distributed Systems Online
, vol.5
, Issue.3
-
-
Mafruz Zaman Ashrafi, K.S.1
Taniar, D.2
-
28
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
29
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
New York, NY, USA: ACM
-
R. Agrawal, T. Imieliński, and A. Swami, "Mining association rules between sets of items in large databases," in SIGMOD '93: Proceedings of the 1993 ACM SIGMOD international conference on Management of data. New York, NY, USA: ACM, 1993, pp. 207-216.
-
(1993)
SIGMOD '93: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imieliński, T.2
Swami, A.3
-
30
-
-
84958033935
-
Integrating classification and association rule mining: A concept lattice framework
-
London, UK: Springer-Verlag
-
K. Hu, Y. Lu, L. Zhou, and C. Shi, "Integrating classification and association rule mining: A concept lattice framework," in RSFDGrC'99. London, UK: Springer-Verlag, 1999, pp. 443-447.
-
(1999)
RSFDGrC'99
, pp. 443-447
-
-
Hu, K.1
Lu, Y.2
Zhou, L.3
Shi, C.4
-
31
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Washington, DC, USA: IEEE Computer Society
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A Sense of Self for Unix Processes," in SP '96. Washington, DC, USA: IEEE Computer Society, 1996, p. 120.
-
(1996)
SP '96
, pp. 120
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
32
-
-
79957596413
-
A Dynamic Data Mining Technique for Intrusion Detection Systems
-
New York, NY, USA: ACM
-
B. D. Caulkins, J. Lee, and M. Wang, "A Dynamic Data Mining Technique for Intrusion Detection Systems," in ACMSE 43. New York, NY, USA: ACM, 2005, pp. 148-153.
-
(2005)
ACMSE 43
, pp. 148-153
-
-
Caulkins, B.D.1
Lee, J.2
Wang, M.3
|