Sciweavers

549 search results - page 21 / 110
» Belief-Based Risk Analysis
Sort
View
ICSE
2012
IEEE-ACM
13 years 2 months ago
A large scale exploratory analysis of software vulnerability life cycles
Abstract—Software systems inherently contain vulnerabilities that have been exploited in the past resulting in significant revenue losses. The study of vulnerability life cycles...
Muhammad Shahzad, Muhammad Zubair Shafiq, Alex X. ...
ISI
2004
Springer
15 years 5 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ATAL
2009
Springer
15 years 6 months ago
Generalization risk minimization in empirical game models
Experimental analysis of agent strategies in multiagent systems presents a tradeoff between granularity and statistical confidence. Collecting a large amount of data about each s...
Patrick R. Jordan, Michael P. Wellman
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
15 years 5 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
ANOR
2007
103views more  ANOR 2007»
14 years 12 months ago
A semi-analytical method for VaR and credit exposure analysis
In this paper, we discuss new analytical methods for computing Value-at-Risk (VaR)andacreditexposureprofile.UsingaMonteCarlosimulationapproachasabenchmark, we find that the analy...
Ben De Prisco, Ian Iscoe, Alexander Y. Kreinin, Ah...