Sciweavers

5722 search results - page 94 / 1145
» Security Function Interactions
Sort
View
119
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
DIMVA
2011
14 years 4 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
84
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
93
Voted
APVIS
2010
15 years 2 months ago
Volume exploration using ellipsoidal Gaussian transfer functions
This paper presents an interactive transfer function design tool based on ellipsoidal Gaussian transfer functions (ETFs). Our approach explores volumetric features in the statisti...
Yunhai Wang, Wei Chen, Guihua Shan, Tingxin Dong, ...
72
Voted
BC
2007
81views more  BC 2007»
15 years 28 days ago
Cross-intensity functions and the estimate of spike-time jitter
Correlation measures are important tools for the analysis of simultaneously recorded spike trains. A well-known measure with probabilistic interpretation is the cross-intensity fun...
Richard H. R. Hahnloser