Sciweavers

375 search results - page 9 / 75
» Making Abstract Machines Less Abstract
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 2 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
ISBRA
2011
Springer
14 years 1 months ago
Query-Adaptive Ranking with Support Vector Machines for Protein Homology Prediction
Abstract. Protein homology prediction is a crucial step in templatebased protein structure prediction. The functions that rank the proteins in a database according to their homolog...
Yan Fu, Rong Pan, Qiang Yang, Wen Gao
ICCS
2001
Springer
15 years 2 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
ESORICS
2005
Springer
15 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
71
Voted
ECAI
2008
Springer
15 years 3 days ago
Groovy Neural Networks
Abstract. The drum machine has been an important tool in music production for decades. However, its flawless way of playing drum patterns is often perceived as mechanical and rigid...
Axel Tidemann, Yiannis Demiris