Sciweavers

1737 search results - page 94 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ECAI
2008
Springer
15 years 1 months ago
An Analysis of Bayesian Network Model-Approximation Techniques
Abstract. Two approaches have been used to perform approximate inference in Bayesian networks for which exact inference is infeasible: employing an approximation algorithm, or appr...
Adamo Santana, Gregory M. Provan
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 4 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 10 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
SCIA
2005
Springer
211views Image Analysis» more  SCIA 2005»
15 years 5 months ago
Perception-Action Based Object Detection from Local Descriptor Combination and Reinforcement Learning
This work proposes to learn visual encodings of attention patterns that enables sequential attention for object detection in real world environments. The system embeds a saccadic d...
Lucas Paletta, Gerald Fritz, Christin Seifert
HYBRID
1997
Springer
15 years 4 months ago
Controller Scheduling Using Neural Networks: Implementation and Experimental Results
This paper presents the results of simulation and control experiments using a recently proposed method for real-time switching among a pool of controllers. The switching strategy ...
Enrique D. Ferreira, Bruce H. Krogh