Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- AFSRs (1)
- Anomaly IDS (1)
- Cross Entropy (1)
- Denial-of-service (DoS). Internet Control Message Protocol (ICMP). User Datagram Protocol (UDP). Open Systems Interconnection Layers Attacks (OSI). Self-Organize-Map (SOM). Multilayer perceptron (MLP). (1)
- Description Logics (1)
-
- FCSRs (1)
- Genetic Algorithm (1)
- Head-mounted display (HMD) (1)
- Hierarchical hypermedia (1)
- IDS (1)
- Information Retrieval (1)
- Information Theory (1)
- Information personalization (1)
- Interactive media (1)
- Multi-sequences (1)
- Navigation (1)
- Out-of-turn interaction (1)
- Partial evaluation (1)
- Program slicing (1)
- Program transformations (1)
- RGB-D systems (1)
- Register synthesis problem (1)
- Signature IDS (1)
- Tele-immersive systems (1)
- Video conferencing (1)
- Virtual environments (1)
- Virtual reality (1)
- Web Information Systems (1)
- Web Search (1)
- Web interaction (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Information Security
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
Master of Science in Information Technology Theses
Web application security is a definite threat to the world’s information technology infrastructure. The Open Web Application Security Project (OWASP), generally defines web application security violations as unauthorized or unintentional exposure, disclosure, or loss of personal information. These breaches occur without the company’s knowledge and it often takes a while before the web application attack is revealed to the public, specifically because the security violations are fixed. Due to the need to protect their reputation, organizations have begun researching solutions to these problems. The most widely accepted solution is the use of an Intrusion Detection System (IDS). Such systems currently …
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Electronic Theses, Projects, and Dissertations
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories …
User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang
User Interface Design, Moritz Stefaner, Sebastien Ferre, Saverio Perugini, Jonathan Koren, Yi Zhang
Saverio Perugini
As detailed in Chap. 1, system implementations for dynamic taxonomies and faceted search allow a wide range of query possibilities on the data. Only when these are made accessible by appropriate user interfaces, the resulting applications can support a variety of search, browsing and analysis tasks. User interface design in this area is confronted with specific challenges. This chapter presents an overview of both established and novel principles and solutions.
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan
Saverio Perugini
Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
An Immersive Telepresence System Using Rgb-D Sensors And Head-Mounted Display, Xinzhong Lu, Ju Shen, Saverio Perugini, Jianjun Yang
Saverio Perugini
We present a tele-immersive system that enables people to interact with each other in a virtual world using body gestures in addition to verbal communication. Beyond the obvious applications, including general online conversations and gaming, we hypothesize that our proposed system would be particularly beneficial to education by offering rich visual contents and interactivity. One distinct feature is the integration of egocentric pose recognition that allows participants to use their gestures to demonstrate and manipulate virtual objects simultaneously. This functionality enables the instructor to effectively and efficiently explain and illustrate complex concepts or sophisticated problems in an intuitive manner. The …
Topics On Register Synthesis Problems, Weihua Liu
Topics On Register Synthesis Problems, Weihua Liu
Theses and Dissertations--Computer Science
Pseudo-random sequences are ubiquitous in modern electronics and information technology. High speed generators of such sequences play essential roles in various engineering applications, such as stream ciphers, radar systems, multiple access systems, and quasi-Monte-Carlo simulation. Given a short prefix of a sequence, it is undesirable to have an efficient algorithm that can synthesize a generator which can predict the whole sequence. Otherwise, a cryptanalytic attack can be launched against the system based on that given sequence.
Linear feedback shift registers (LFSRs) are the most widely studied pseudorandom sequence generators. The LFSR synthesis problem can be solved by the Berlekamp-Massey algorithm, …