Sciweavers

5722 search results - page 179 / 1145
» Security Function Interactions
Sort
View
CCS
2006
ACM
15 years 4 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
CCS
2008
ACM
15 years 2 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
99
Voted
CONEXT
2008
ACM
15 years 2 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
CSREASAM
2007
15 years 2 months ago
Security Based Heuristic SAX for XML Parsing
- XML based services integrate information resources running on different platforms or technologies to enhance the service efficiency. Thus, the volume of XML traffic on networks i...
Wei Wang
120
Voted
RECOMB
2006
Springer
16 years 1 months ago
Integrated Protein Interaction Networks for 11 Microbes
We have combined four different types of functional genomic data to create high coverage protein interaction networks for 11 microbes. Our integration algorithm naturally handles s...
Balaji S. Srinivasan, Antal F. Novak, Jason Flanni...