Sciweavers

5475 search results - page 1073 / 1095
» Model Driven Security
Sort
View
AAAI
2006
15 years 1 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
129
Voted
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 20 days ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
BMCBI
2006
109views more  BMCBI 2006»
15 years 15 days ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
JMM2
2007
96views more  JMM2 2007»
15 years 10 days ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
JPDC
2007
117views more  JPDC 2007»
15 years 10 days ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
« Prev « First page 1073 / 1095 Last » Next »