Sciweavers

561 search results - page 37 / 113
» A Constructive Approach to Testing Model Transformations
Sort
View
SPIN
2009
Springer
15 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
EATIS
2007
ACM
15 years 2 months ago
A model-driven approach for reusing service compositions
The web service approach provides mechanisms for simplifying application integration. However, to meaningfully facilitate scalable development and maintenance of web service appli...
Carlos Granell, Michael Gould, Dolores Marí...
DATAMINE
2006
117views more  DATAMINE 2006»
14 years 10 months ago
A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...
ACSAC
2004
IEEE
15 years 1 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller

Publication
255views
13 years 7 months ago
Ant-Q Hyper-Heuristic Approach for solving 2-Dimensional Cutting Stock Problem
Hyper-heuristics are new approaches which aim at raising the level of abstraction when solving combinatorial optimisation problems. In this paper we introduce a new hyper-heuristi...
Imen Khamassi, Moez Hammami, Khaled Ghédira