Sciweavers

1486 search results - page 15 / 298
» Firewall Rules Analysis
Sort
View
79
Voted
ACSAC
2002
IEEE
15 years 2 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
APSEC
1998
IEEE
15 years 1 months ago
Change Impact Analysis for A Class Hierarchy
Modified programs are required to be retested to determine whether changes have been made correctly and to investigate whether those cause any adverse effect on the program behavi...
Yoon Kyu Jang, Heung Seok Chae, Yong Rae Kwon, Doo...
CAISE
2003
Springer
15 years 2 months ago
Improving Termination Analysis of Active Rules with Priorities
This paper presents an algorithm for termination static analysis of active rules with priorities. Active rules termination is an undecidable problem. Several recent works have sugg...
Alain Couchot
79
Voted
CVPR
2007
IEEE
15 years 3 months ago
Trajectory Series Analysis based Event Rule Induction for Visual Surveillance
In this paper, a generic rule induction framework based on trajectory series analysis is proposed to learn the event rules. First the trajectories acquired by a tracking system ar...
Zhang Zhang, Kaiqi Huang, Tieniu Tan, Liangsheng W...
102
Voted
RULEML
2009
Springer
15 years 4 months ago
Exploration of SWRL Rule Bases through Visualization, Paraphrasing, and Categorization of Rules
Rule bases are increasingly being used as repositories of knowledge content on the Semantic Web. As the size and complexity of these rule bases s, developers and end users need met...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das