Sciweavers

90 search results - page 7 / 18
» A Decision Theoretic Approach to Data Leakage Prevention
Sort
View
101
Voted
ACSC
2007
IEEE
15 years 3 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
SEMWEB
2009
Springer
15 years 6 months ago
Probabilistic Ontology and Knowledge Fusion for Procurement Fraud Detection in Brazil
To cope with society’s demand for transparency and corruption prevention, the Brazilian Office of the Comptroller General (CGU) has carried out a number of actions, including: aw...
Rommel N. Carvalho, Kathryn B. Laskey, Paulo Cesar...
AAAI
2004
15 years 1 months ago
Using Performance Profile Trees to Improve Deliberation Control
Performance profile trees have recently been proposed as a theoretical basis for fully normative deliberation control. In this paper we conduct the first experimental study of the...
Kate Larson, Tuomas Sandholm
77
Voted
GI
2007
Springer
15 years 5 months ago
Fuzzy Operators for Confidence Modelling in Automotive Safety Applications
: The fusion of data from different sensorial sources is the most promising method to increase robustness and reliability of environmental perception today. The paper presents an a...
Ulrich Scheunert, Philipp Lindner, Eric Richter, G...
TES
2001
Springer
15 years 4 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...