Sciweavers

849 search results - page 170 / 170
» Similarity of business process models: Metrics and evaluatio...
Sort
View
CCS
2005
ACM
13 years 10 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
ACSAC
2004
IEEE
13 years 8 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 5 months ago
Open Graphs and Monoidal Theories
String diagrams are a powerful tool for reasoning about physical processes, logic circuits, tensor networks, and many other compositional structures. The distinguishing feature of...
Lucas Dixon, Aleks Kissinger
WICOMM
2011
12 years 11 months ago
A pragmatic approach to area coverage in hybrid wireless sensor networks
Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to a...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha