Sciweavers

1186 search results - page 40 / 238
» A New Approach to Secure Logging
Sort
View
120
Voted
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 4 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
85
Voted
SAC
2004
ACM
15 years 5 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ACL
2006
15 years 1 months ago
An Iterative Implicit Feedback Approach to Personalized Search
General information retrieval systems are designed to serve all users without considering individual needs. In this paper, we propose a novel approach to personalized search. It c...
Yuanhua Lv, Le Sun, Junlin Zhang, Jian-Yun Nie, Wa...
ICANN
2010
Springer
15 years 19 days ago
Tumble Tree - Reducing Complexity of the Growing Cells Approach
We propose a data structure that decreases complexity of unsupervised competitive learning algorithms which are based on the growing cells structures approach. The idea is based on...
Hendrik Annuth, Christian-A. Bohn
106
Voted
EUROCRYPT
2001
Springer
15 years 5 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith