Sciweavers

10061 search results - page 1628 / 2013
» Statistical Models of Conditioning
Sort
View
SAC
2010
ACM
15 years 12 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
146
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 12 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ISBI
2009
IEEE
15 years 12 months ago
A Compressed Sensing Approach for Biological Microscopic Image Processing
In fluorescence microscopy the noise level and the photobleaching are cross-dependent problems since reducing exposure time to reduce photobleaching degrades image quality while ...
Marcio de Moraes Marim, Elsa D. Angelini, Jean-Chr...
SAC
2009
ACM
15 years 12 months ago
On scheduling soft real-time tasks with lock-free synchronization for embedded devices
In this paper, we consider minimizing the system-level energy consumption through dynamic voltage scaling for embedded devices, while a) allowing concurrent access to shared objec...
Shouwen Lai, Binoy Ravindran, Hyeonjoong Cho
CCS
2009
ACM
15 years 12 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
« Prev « First page 1628 / 2013 Last » Next »