Sciweavers

694 search results - page 87 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Static Detection of Vulnerabilities in x86 Executables
In the last few years, several approaches have been proposed to perform vulnerability analysis of applications written in high-level languages. However, little has been done to au...
Marco Cova, Viktoria Felmetsger, Greg Banks, Giova...
FC
1998
Springer
156views Cryptology» more  FC 1998»
15 years 4 months ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
ESORICS
2004
Springer
15 years 5 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
DOCENG
2009
ACM
15 years 6 months ago
Test collection management and labeling system
In order to evaluate the performance of information retrieval and extraction algorithms, we need test collections. A test collection consists of a set of documents, a clearly form...
Eunyee Koh, Andruid Kerne, Sarah Berry
APVIS
2010
15 years 1 months ago
Context preserving dynamic word cloud visualization
In this paper, we introduce a visualization method that couples a trend chart with word clouds to illustrate temporal content evolutions in a set of documents. Specifically, we us...
Weiwei Cui, Yingcai Wu, Shixia Liu, Furu Wei, Mich...