Sciweavers

4511 search results - page 494 / 903
» Observation Based System Security
Sort
View
ACSAC
2007
IEEE
15 years 11 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
127
Voted
ACSAC
2000
IEEE
15 years 9 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
129
Voted
INFOCOM
2002
IEEE
15 years 10 months ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
VLDB
2003
ACM
125views Database» more  VLDB 2003»
16 years 5 months ago
THESUS: Organizing Web document collections based on link semantics
Abstract. The requirements for effective search and management of the WWW are stronger than ever. Currently Web documents are classified based on their content not taking into acco...
Maria Halkidi, Benjamin Nguyen, Iraklis Varlamis, ...
DLOG
2011
14 years 8 months ago
Dependencies to Optimize Ontology Based Data Access
Query answering in Ontology Based Data Access (OBDA) exploits the knowledge of an ontology’s TBox to deal with incompleteness of the ABox (or data source). Current query-answerin...
Mariano Rodriguez-Muro, Diego Calvanese