Sciweavers

2281 search results - page 183 / 457
» Security Patterns and Secure Systems Design
Sort
View
91
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 25 days ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
95
Voted
UTP
2010
14 years 10 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
16 years 1 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
106
Voted
OOPSLA
2005
Springer
15 years 6 months ago
Micro patterns in Java code
Micro patterns are similar to design patterns, except that micro patterns stand at a lower, closer to the implementation, level of abstraction. Micro patterns are also unique in t...
Joseph Gil, Itay Maman
112
Voted
ATAL
2009
Springer
15 years 5 months ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...