Sciweavers

12194 search results - page 170 / 2439
» cans 2010
Sort
View
101
Voted
PAAMS
2010
Springer
14 years 10 months ago
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injectio...
Álvaro Herrero, Cristian Pinzón, Emi...
SEMWEB
2010
Springer
14 years 10 months ago
Completeness Guarantees for Incomplete Reasoners
Abstract. We extend our recent work on evaluating incomplete reasoners by introducing strict testing bases. We show how they can be used in practice to identify ontologies and quer...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
91
Voted
SICHERHEIT
2010
14 years 10 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
63
Voted
CORR
2010
Springer
59views Education» more  CORR 2010»
14 years 10 months ago
1D Effectively Closed Subshifts and 2D Tilings
Michael Hochman showed that every 1D effectively closed subshift can be simulated by a 3D subshift of finite type and asked whether the same can be done in 2D. It turned out that t...
Bruno Durand, Alexander Shen, Andrei E. Romashchen...
92
Voted
HT
2010
ACM
14 years 10 months ago
Enhancing search applications by utilizing mind maps
In this paper we present how sharing and utilizing mind maps could enhance search applications such as document search engines and recommender systems. In addition, we briefly pre...
Jöran Beel, Bela Gipp