Sciweavers

143 search results - page 14 / 29
» Measuring, analyzing and predicting security vulnerabilities...
Sort
View
157
Voted
BIRTHDAY
2011
Springer
13 years 9 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
CCS
2003
ACM
15 years 2 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 11 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang
CCS
2001
ACM
15 years 2 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
DAC
2008
ACM
14 years 11 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran