2011
DOI: 10.5383/juspn.03.01.001
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection for Ubiquitous & Pervasive Environments using Plan Recognition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Here, we implemented a distributed regression-based algorithm called iterative shrinkage-thresholding algorithm (DISTA), a stochastic optimization algorithm that can handle a large amount of training instances. Our experiments in [21] showed that it can improve model accuracy by up to 16% by incorporating our feature selection strategy compared to other baselines.…”
Section: Sentiment Analysis Model and Algorithmsmentioning
confidence: 87%
See 2 more Smart Citations
“…Here, we implemented a distributed regression-based algorithm called iterative shrinkage-thresholding algorithm (DISTA), a stochastic optimization algorithm that can handle a large amount of training instances. Our experiments in [21] showed that it can improve model accuracy by up to 16% by incorporating our feature selection strategy compared to other baselines.…”
Section: Sentiment Analysis Model and Algorithmsmentioning
confidence: 87%
“…The authors of [21] contend that secondary components, such as alarm systems, RFIDs, and navigation systems, tend to be more vulnerable than traditional computers and therefore are likely points of attack. They further propose a defensive plan recognition model that can predict likely actions and advise a system to either aid or hamper an observed agent by suggesting or forcing particular actions.…”
Section: Mapping Attacksmentioning
confidence: 99%
See 1 more Smart Citation