Sciweavers

405 search results - page 4 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICCSA
2005
Springer
15 years 3 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
CCS
2006
ACM
15 years 1 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
89
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Driver risk evaluation based on acceleration, deceleration, and steering behavior
We propose a driver risk evaluation method based on the analysis of driving data captured with drive recorders. To evaluate the acceleration behavior of each driver we plot the ma...
Chiyomi Miyajima, Hiroki Ukai, Atsumi Naito, Hideo...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 3 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
BIB
2011
14 years 1 months ago
Using cross-validation to evaluate predictive accuracy of survival risk classifiers based on high-dimensional data
Developments in whole genome biotechnology have stimulated statistical focus on prediction methods. We review here methodology for classifying patients into survival risk groups a...
Richard M. Simon, Jyothi Subramanian, Ming-Chung L...