Sciweavers

82 search results - page 7 / 17
» Developing Group Decision Support Systems for Deception Dete...
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 1 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
93
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 23 hour ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
WCRE
2010
IEEE
14 years 10 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 6 months ago
Which collaboration patterns are most challenging: A global survey of facilitators
Facilitation is a key success factor for effective Group Support Systems (GSS) applications. The development of effective support for facilitation becomes more critical than ever ...
Mariëlle den Hengst, Mark Adkins
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
15 years 5 months ago
Causal Reasoning Engine: An Explanation-Based Approach to Syndromic Surveillance
1 Quickly detecting an unexpected pathogen can save many lives. In cases of bioterrorism or naturally occurring epidemics, accurate diagnoses may not be made until much of the popu...
Benjamin B. Perry, Tim Van Allen