Sciweavers

96 search results - page 2 / 20
» Security Threat Prediction in a Local Area Network Using Sta...
Sort
View
ESEM
2008
ACM
13 years 7 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 5 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
14 years 3 hour ago
Supporting Generic Cost Models for Wide-Area Stream Processing
— Existing stream processing systems are optimized for a specific metric, which may limit their applicability to diverse applications and environments. This paper presents XFlow...
Olga Papaemmanouil, Ugur Çetintemel, John J...
IROS
2009
IEEE
186views Robotics» more  IROS 2009»
13 years 11 months ago
A statistical approach to gas distribution modelling with mobile robots - The Kernel DM+V algorithm
— Gas distribution modelling constitutes an ideal application area for mobile robots, which – as intelligent mobile gas sensors – offer several advantages compared to station...
Achim J. Lilienthal, Matteo Reggente, Marco Trinca...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 5 months ago
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third gener...
R. Shankar, Timothy Rajkumar, P. Dananjayan