Sciweavers

683 search results - page 85 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
168
Voted
CCS
2011
ACM
14 years 20 days ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
96
Voted
ACSAC
2006
IEEE
15 years 6 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
ISBI
2008
IEEE
16 years 1 months ago
Towards digital representation of Drosophila embryogenesis
Animal development can be described as a complex, threedimensional cellular system that changes dramatically across time as a consequence of cell proliferation, differentiation an...
Stephan Preibisch, Radoslaw Ejsmont, Torsten Rohlf...
117
Voted
BMCBI
2010
164views more  BMCBI 2010»
15 years 24 days ago
Investigating the validity of current network analysis on static conglomerate networks by protein network stratification
Background: A molecular network perspective forms the foundation of systems biology. A common practice in analyzing protein-protein interaction (PPI) networks is to perform networ...
Minlu Zhang, Long J. Lu
BMCBI
2005
125views more  BMCBI 2005»
15 years 18 days ago
Query3d: a new method for high-throughput analysis of functional residues in protein structures
Background: The identification of local similarities between two protein structures can provide clues of a common function. Many different methods exist for searching for similar ...
Gabriele Ausiello, Allegra Via, Manuela Helmer-Cit...