Sciweavers

1562 search results - page 294 / 313
» Learning a Scanning Understanding for
Sort
View
144
Voted
VIZSEC
2007
Springer
15 years 9 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
149
Voted
ACSC
2006
IEEE
15 years 9 months ago
Using formal concept analysis with an incremental knowledge acquisition system for web document management
It is necessary to provide a method to store Web information effectively so it can be utilised as a future knowledge resource. A commonly adopted approach is to classify the retri...
Timothy J. Everts, Sung Sik Park, Byeong Ho Kang
153
Voted
IJCNN
2006
IEEE
15 years 9 months ago
An optimization approach to achieve unsupervised segmentation and binding in a dynamical network
— We present a novel network of oscillatory units, whose behavior is described by the amplitude and phase of oscillations. While building on previous work, the system presented i...
A. Ravishankar Rao, Guillermo A. Cecchi, Charles C...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 9 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
HASKELL
2006
ACM
15 years 9 months ago
Statically typed linear algebra in Haskell
Many numerical algorithms are specified in terms of operations on vectors and matrices. Matrix operations can be executed extremely efficiently using specialized linear algebra k...
Frederik Eaton