Sciweavers

718 search results - page 72 / 144
» From decision theory to decision aiding methodology
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
15 years 10 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
CCS
2009
ACM
15 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
ICPADS
2006
IEEE
15 years 3 months ago
Experiences with Simulations - A Light and Fast Model for Secure Web Applications
Using simulations of a complex system such as a Web Application Server provides us with a tool that allows the running of tests without using the resources needed in a real system...
Ramon Nou, Jordi Guitart, David Carrera, Jordi Tor...
CG
2004
Springer
15 years 3 months ago
Strategic Interactions in the TAC 2003 Supply Chain Tournament
The TAC 2003 supply-chaingame presented automated trading agents with a challenging strategic problem. Embedded within a complex stochastic environment was a pivotal strategic deci...
Joshua Estelle, Yevgeniy Vorobeychik, Michael P. W...
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
15 years 2 months ago
Value based Requirements Creation for Electronic Commerce Applications
Electronic commerce applications have special features compared to conventional information systems. First, because electronic commerce usually involves yet nonexisting business a...
Jaap Gordijn, Hans Akkermans, Hans van Vliet