Sciweavers

4511 search results - page 492 / 903
» Observation Based System Security
Sort
View
167
Voted
DIM
2009
ACM
15 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ANCS
2007
ACM
15 years 9 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
139
Voted
ACSAC
2002
IEEE
15 years 10 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
140
Voted
APLAS
2004
ACM
15 years 8 months ago
History Effects and Verification
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher-order programs. The ...
Christian Skalka, Scott F. Smith
INFORMATICALT
2010
169views more  INFORMATICALT 2010»
15 years 3 months ago
Parameters Estimation in Modelling of Gas-Gap in RBMK Type Reactor Using Bayesian Approach
Abstract. This study presents developed algorithm for assessment and updating estimates of parameters in the mathematical models of non-stationary processes (for instance, system a...
Inga Zutautaite-Seputiene, Juozas Augutis, Laimuti...