Sciweavers

499 search results - page 56 / 100
» A Study on Latent Vulnerabilities
Sort
View
100
Voted
HCSE
2010
14 years 10 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
AICS
2009
14 years 10 months ago
Robustness Analysis of Model-Based Collaborative Filtering Systems
Collaborative filtering (CF) recommender systems are very popular and successful in commercial application fields. However, robustness analysis research has shown that conventional...
Zunping Cheng, Neil Hurley
90
Voted
CN
2011
129views more  CN 2011»
14 years 7 months ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
98
Voted
CORR
2011
Springer
168views Education» more  CORR 2011»
14 years 4 months ago
Robustness and modular structure in networks
Many complex systems, from power grids and the internet, to the brain and society, can be modeled using modular networks. Modules, densely interconnected groups of elements, often...
James P. Bagrow, Sune Lehmann, Yong-Yeol Ahn
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 28 days ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...