Sökning: "DATA-COLLECTION"
Visar resultat 1 - 5 av 943 avhandlingar innehållade ordet DATA-COLLECTION.
1. On Adapting Data Collection to Intrusion Detection
Sammanfattning : Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and attacks from external penetrators. They can also detect both known and previously unknown attacks. These capabilities make them valuableassets in the protection of computer systems and networks. LÄS MER
2. Scalable Methods for Developing Interlocutor-aware Embodied Conversational Agents : Data Collection, Behavior Modeling, and Evaluation Methods
Sammanfattning : This work presents several methods, tools, and experiments that contribute to the development of interlocutor-aware Embodied Conversational Agents (ECAs). Interlocutor-aware ECAs take the interlocutor's behavior into consideration when generating their own non-verbal behaviors. LÄS MER
3. Aspects of Adapting Data Collection to Intrusion Detection
Sammanfattning : The focus of this thesis is on data collection and in particular data collection for intrusion detection purposes. Data collection is the first, and possibly most important activity in the overall intrusion detection process. The result of the detection can never be better than the data on which the detection is based. LÄS MER
4. Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems
Sammanfattning : Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. LÄS MER
5. Secure and Privacy-Aware Data Collection in Wireless Sensor Networks
Sammanfattning : A wireless sensor network is a collection of numerous sensors distributed on an area of interest to collect and process data from the environment. One particular threat in wireless sensor networks is node compromise attacks, that is, attacks where the adversary gets physical access to a node and to the programs and keying material stored on it. LÄS MER