Sciweavers

526 search results - page 8 / 106
» Increase honeypot security through data analysis
Sort
View
WPES
2003
ACM
15 years 2 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
BMCBI
2011
14 years 4 months ago
LabKey Server: An open source platform for scientific data integration, analysis and collaboration
Background: Broad-based collaborations are becoming increasingly common among disease researchers. For example, the Global HIV Enterprise has united cross-disciplinary consortia t...
Elizabeth K. Nelson, Britt Piehler, Josh Eckels, A...
ACSC
2006
IEEE
15 years 1 months ago
Tracing secure information flow through mode changes
Communications devices intended for use in securitycritical applications must be rigorously evaluated to ensure they preserve data confidentiality. This process includes tracing t...
Colin J. Fidge, Tim McComb
86
Voted
IOLTS
2008
IEEE
117views Hardware» more  IOLTS 2008»
15 years 3 months ago
Verification and Analysis of Self-Checking Properties through ATPG
Present and future semiconductor technologies are characterized by increasing parameters variations as well as an increasing susceptibility to external disturbances. Transient err...
Marc Hunger, Sybille Hellebrand
BMCBI
2008
182views more  BMCBI 2008»
14 years 9 months ago
MiMiR - an integrated platform for microarray data sharing, mining and analysis
Background: Despite considerable efforts within the microarray community for standardising data format, content and description, microarray technologies present major challenges i...
Chris Tomlinson, Manjula Thimma, Stelios Alexandra...