Sciweavers

4241 search results - page 660 / 849
» A Knowledge-Based Software Information System
Sort
View
CEC
2008
IEEE
15 years 11 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ICST
2008
IEEE
15 years 11 months ago
On Combining Multi-formalism Knowledge to Select Models for Model Transformation Testing
Testing remains a major challenge for model transformation development. Test models that are used as test data for model transformations, are constrained by various sources of kno...
Sagar Sen, Benoit Baudry, Jean-Marie Mottu
ISPASS
2008
IEEE
15 years 11 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 11 months ago
Using Agile Practices to Spark Innovation in a Small to Medium Sized Business
The media industry is challenged to find new lines of business as technology redefines content, distribution and customer expectations. This is a case study of Oxygen Media where ...
Ken H. Judy, Ilio Krumins-Beens
CSFW
2006
IEEE
15 years 11 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee