Learn More
As the number of network-based attacks continue to increase, network operations and management tasks become more and more complex. As we have come to depend on reliable operations of networked systems, it is important to be able to provide security measures that both efficient in terms of processing speed as well as in detecting attacks that are not in the(More)
The overall aim of this study was to examine the relationship between offender status (violent vs. nonviolent) and selected predictor variables from personality, behavioral, and intellectual domains. The two main sub goals were (a) to determine which variables from these domains were most closely associated with offender status, and (b) to construct a(More)
In network intrusion detection, anomaly-based solutions complement signature-based solutions in mitigating zero-day attacks, but require extensive training and learning to effectively model what the normal pattern for a given system (or service) looks like. Though the training typically happens off-line, and the processing speed is not as important as the(More)
The foundation of this study was based on an idiosyncratic concept, which uses probabilistic determinations (Kamata, Tenenbaum, & Hanin, 2002) to verify the utility and effectiveness of a biofeedback intervention by manipulating affective performance states in a race-car simulator. Nine males completed five separate time-trials of a simulated racing task(More)
Consumers and service providers are both becoming increasingly concerned about new, never-before-seen attacks. Anomaly-based intrusion prevention is an important part of cybersecurity, which offers the possibility of detecting some zero-day attacks. Typically, detection speed and efficacy (in terms of true and false positives) are considered in evaluating(More)
  • 1