Sciweavers

499 search results - page 8 / 100
» A Study on Latent Vulnerabilities
Sort
View
SP
2007
IEEE
15 years 3 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
84
Voted
DRM
2003
Springer
15 years 2 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
WCRE
2006
IEEE
15 years 3 months ago
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study
Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the proce...
Marco Lormans, Hans-Gerhard Groß, Arie van D...
EMNLP
2008
14 years 11 months ago
Studying the History of Ideas Using Topic Models
How can the development of ideas in a scientific field be studied over time? We apply unsupervised topic modeling to the ACL Anthology to analyze historical trends in the field of...
David Hall, Daniel Jurafsky, Christopher D. Mannin...
CIKM
2009
Springer
15 years 4 months ago
Text segmentation via topic modeling: an analytical study
In this paper, the task of text segmentation is approached from a topic modeling perspective. We investigate the use of latent Dirichlet allocation (LDA) topic model to segment a ...
Hemant Misra, François Yvon, Joemon M. Jose...