Sciweavers

245 search results - page 1 / 49
» The Iterated Weakest Link
Sort
View
IEEESP
2010
99views more  IEEESP 2010»
14 years 8 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
CVPR
2011
IEEE
14 years 6 months ago
Finding the Weakest Link in Person Detectors
Detecting people remains a popular and challenging problem in computer vision. In this paper, we analyze parts-based models for person detection to determine which components of t...
Devi Parikh, Larry Zitnick
IEEESP
2006
52views more  IEEESP 2006»
14 years 9 months ago
Strengthening the Weakest Link in Digital Protection
William Suchan, Edward Sobiesk
TELSYS
2010
132views more  TELSYS 2010»
14 years 4 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
ALC
1997
14 years 10 months ago
Predicative semantics of loops
A predicative semantics is a mapping of programs to predicates. These predicates characterize sets of acceptable observations. The presence of time in the observations makes the o...
Theodore S. Norvell