Sciweavers

1281 search results - page 37 / 257
» BASIS: A Biological Approach to System Information Security
Sort
View
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
15 years 8 months ago
Organizational Impacts of Cyber Security Provisions: A Sociotechnical Framework
In this paper, we outline a conceptual framework for linking cyber security provisions to business processes. The framework is presented for use in analyzing the cost and performa...
Anthony M. Cresswell, Shahidul Hassan
SADFE
2005
IEEE
15 years 7 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
AINA
2007
IEEE
15 years 8 months ago
An Improved Approach to Secure Authentication and Signing
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequ...
David Argles, Alex Pease, Robert John Walters
KDD
2003
ACM
133views Data Mining» more  KDD 2003»
16 years 2 months ago
Interactive Analysis of Gene Interactions Using Graphical gaussian model
DNA microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Xintao Wu, Yong Ye, Kalpathi R. Subramanian
ICDIM
2007
IEEE
15 years 8 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...