Sciweavers

245 search results - page 1 / 49
» The Iterated Weakest Link
Sort
View
67
Voted
IEEESP
2010
99views more  IEEESP 2010»
14 years 8 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
157
Voted
CVPR
2011
IEEE
14 years 6 months ago
Finding the Weakest Link in Person Detectors
Detecting people remains a popular and challenging problem in computer vision. In this paper, we analyze parts-based models for person detection to determine which components of t...
Devi Parikh, Larry Zitnick
IEEESP
2006
52views more  IEEESP 2006»
14 years 10 months ago
Strengthening the Weakest Link in Digital Protection
William Suchan, Edward Sobiesk
TELSYS
2010
132views more  TELSYS 2010»
14 years 4 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
ALC
1997
14 years 11 months ago
Predicative semantics of loops
A predicative semantics is a mapping of programs to predicates. These predicates characterize sets of acceptable observations. The presence of time in the observations makes the o...
Theodore S. Norvell