Sciweavers

87 search results - page 18 / 18
» The Use of Honeynets to Detect Exploited Systems Across Larg...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 10 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
WWW
2004
ACM
14 years 6 months ago
Is question answering an acquired skill?
We present a question answering (QA) system which learns how to detect and rank answer passages by analyzing questions and their answers (QA pairs) provided as training data. We b...
Ganesh Ramakrishnan, Soumen Chakrabarti, Deepa Par...