Sciweavers

2715 search results - page 305 / 543
» Network bucket testing
Sort
View
152
Voted
IWIA
2006
IEEE
15 years 9 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
126
Voted
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 9 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
117
Voted
ICANN
2005
Springer
15 years 9 months ago
Action Understanding and Imitation Learning in a Robot-Human Task
We report results of an interdisciplinary project which aims at endowing a real robot system with the capacity for learning by goaldirected imitation. The control architecture is b...
Wolfram Erlhagen, Albert Mukovskiy, Estela Bicho, ...
121
Voted
ICANN
2005
Springer
15 years 9 months ago
Connectionist Modeling of Linguistic Quantifiers
This paper presents a new connectionist model of the grounding of linguistic quantifiers in perception that takes into consideration the contextual factors affecting the use of vag...
Rohana K. Rajapakse, Angelo Cangelosi, Kenny R. Co...
128
Voted
ICANN
2005
Springer
15 years 9 months ago
Implicit Relevance Feedback from Eye Movements
We explore the use of eye movements as a source of implicit relevance feedback information. We construct a controlled information retrieval experiment where the relevance of each t...
Jarkko Salojärvi, Kai Puolamäki, Samuel ...