Sciweavers

956 search results - page 90 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
CCS
2007
ACM
15 years 4 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 10 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
ESCIENCE
2007
IEEE
15 years 4 months ago
Building a Data Grid for the Australian Nanostructural Analysis Network
: This paper describes the architecture and services developed by the GRANI project for the Australian Nanostructural Analysis Network Organization (NANO). The aim of GRANI was to ...
Brendan Mauger, Jane Hunter, John Drennan, Ashley ...
BPM
2007
Springer
155views Business» more  BPM 2007»
15 years 1 months ago
Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics
Abstract. Process Mining is a technique for extracting process models from execution logs. This is particularly useful in situations where people have an idealized view of reality....
Christian W. Günther, Wil M. P. van der Aalst
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 1 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst