Sciweavers

245 search results - page 26 / 49
» Verifying networked programs using a model checker extension
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SDM
2010
SIAM
166views Data Mining» more  SDM 2010»
14 years 8 months ago
Directed Network Community Detection: A Popularity and Productivity Link Model
In this paper, we consider the problem of community detection in directed networks by using probabilistic models. Most existing probabilistic models for community detection are ei...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
SIGADA
2004
Springer
15 years 3 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
SIGSOFT
2007
ACM
15 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
79
Voted
VTC
2008
IEEE
131views Communications» more  VTC 2008»
15 years 4 months ago
Downtilted Base Station Antennas - A Simulation Model Proposal and Impact on HSPA and LTE Performance
— This paper proposes a low-complexity model for vertical antenna radiation patterns, e.g. for inclusion in systemlevel simulations. They can be seen as extensions to the horizon...
Fredrik Gunnarsson, Martin N. Johansson, Anders Fu...