Sciweavers

3096 search results - page 2 / 620
» Ontology: Use and Abuse
Sort
View
ACSAC
2004
IEEE
13 years 8 months ago
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...
ISCAPDCS
2004
13 years 6 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
CEAS
2008
Springer
13 years 6 months ago
On Free Speech and Civil Discourse: Filtering Abuse in Blog Comments
Internet blogs provide forums for discussions within virtual communities, allowing readers to post comments on what they read. However, such comments may contain abuse, such as pe...
D. Sculley
ACSW
2004
13 years 6 months ago
Learning Dynamics of Pesticide Abuse through Data Mining
Recent studies by agriculture researchers in Pakistan have shown that attempts of crop yield maximization through pro-pesticide state policies have led to a dangerously high pesti...
Ahsan Abdullah, Stephen Brobst, Ijaz Pervaiz
ACSAC
2001
IEEE
13 years 8 months ago
Abuse-Case-Based Assurance Arguments
This paper describes an extension to abuse-casebased security requirements analysis that provides a lightweight means of increasing assurance in security relevant software. The ap...
John P. McDermott