Sciweavers

158 search results - page 21 / 32
» Information Leakage Detection in Distributed Systems using S...
Sort
View
112
Voted
MM
2004
ACM
94views Multimedia» more  MM 2004»
15 years 7 months ago
Towards automated story analysis using participatory design
Involving a school teacher in the development of the intelligent writing tutor StoryStation allowed progress to be made on the problem of story classification, an aspect of story...
Harry Halpin, Johanna D. Moore, Judy Robertson
115
Voted
CEC
2008
IEEE
15 years 8 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
107
Voted
EJIS
2007
115views more  EJIS 2007»
15 years 1 months ago
Towards agent-oriented model-driven architecture
Model-Driven Architecture (MDA) supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represen...
Liang Xiao 0002, Des Greer
119
Voted
RAID
2010
Springer
15 years 8 days ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
CGO
2003
IEEE
15 years 7 months ago
Dynamic Trace Selection Using Performance Monitoring Hardware Sampling
Optimizing programs at run-time provides opportunities to apply aggressive optimizations to programs based on information that was not available at compile time. At run time, prog...
Howard Chen, Wei-Chung Hsu, Dong-yuan Chen