Sciweavers

1298 search results - page 69 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
123
Voted
FLAIRS
2000
15 years 4 months ago
Graph-Based Hierarchical Conceptual Clustering
Hierarchical conceptual clustering has been proven to be a useful data mining technique. Graph-based representation of structural information has been shown to be successful in kn...
Istvan Jonyer, Lawrence B. Holder, Diane J. Cook
SP
2003
IEEE
15 years 8 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
MIDDLEWARE
2007
Springer
15 years 9 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
SBRN
2000
IEEE
15 years 7 months ago
An Evolutionary Immune Network for Data Clustering
This paper explores basic aspects of the immune system and proposes a novel immune network model with the main goals of clustering and filtering unlabeled numerical data sets. It ...
Leandro Nunes de Castro, Fernando J. Von Zuben
INFOVIS
2003
IEEE
15 years 8 months ago
Visualization of Labeled Data Using Linear Transformations
We present a novel family of data-driven linear transformations, aimed at visualizing multivariate data in a low-dimensional space in a way that optimally preserves the structure ...
Yehuda Koren, Liran Carmel