Sciweavers

546 search results - page 65 / 110
» Using and Detecting Links in Wikipedia
Sort
View
101
Voted
CN
2004
95views more  CN 2004»
15 years 11 days ago
Distinguishing between single and multi-source attacks using signal processing
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- or...
Alefiya Hussain, John S. Heidemann, Christos Papad...
89
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Using groupings of static analysis alerts to identify files likely to contain field failures
In this paper, we propose a technique for leveraging historical field failure records in conjunction with automated static analysis alerts to determine which alerts or sets of ale...
Mark Sherriff, Sarah Smith Heckman, J. Michael Lak...
95
Voted
AIMS
2007
Springer
15 years 6 months ago
Harnessing Models for Policy Conflict Analysis
Policy conflict analysis processes based solely on the examination of policy language constructs can not readily discern the semantics associated with the managed system for which ...
Steven Davy, Brendan Jennings
102
Voted
DIMVA
2010
15 years 1 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
177
Voted

Publication
485views
14 years 1 months ago
Incremental Activity Modelling in Multiple Disjoint Cameras
Activity modelling and unusual event detection in a network of cameras is challenging particularly when the camera views are not overlapped. We show that it is possible to detect u...
Chen Change Loy, Tao Xiang, Shaogang Gong