Sciweavers

211 search results - page 32 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
CACM
2004
212views more  CACM 2004»
14 years 11 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
14 years 10 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 5 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
OOPSLA
2005
Springer
15 years 5 months ago
Io: a small programming language
Io is small prototype-based programming language. The ideas in Io are mostly inspired by Smalltalk[1] (all values are objects), Self[2] (prototype-based), NewtonScript[3] (differe...
Steve Dekorte
AGENTS
2000
Springer
15 years 4 months ago
Automated assistants to aid humans in understanding team behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. Tools that can help humans an...
Taylor Raines, Milind Tambe, Stacy Marsella