Sciweavers

102 search results - page 10 / 21
» Secure and Dependable Patterns in Organizations: An Empirica...
Sort
View
COMPUTER
2002
89views more  COMPUTER 2002»
14 years 11 months ago
A Pattern for Softcoded Values
rs use models or abstractions that hide low-level implementation details. Various kinds of representations such as data models, state-transition models, and dataflow models can hel...
Michael R. Blaha, Cheryl Smith
ESORICS
2010
Springer
14 years 9 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
CCS
2009
ACM
15 years 6 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
ISI
2007
Springer
15 years 5 months ago
DOTS: Detection of Off-Topic Search via Result Clustering
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
Nazli Goharian, Alana Platt
CIDM
2009
IEEE
15 years 6 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder