Sciweavers

10 search results - page 2 / 2
» compsec 2007
Sort
View
66
Voted
COMPSEC
2007
69views more  COMPSEC 2007»
15 years 3 months ago
Intrusion detection using text processing techniques with a kernel based similarity measure
Alok Sharma, Arun K. Pujari, Kuldip K. Paliwal
79
Voted
COMPSEC
2007
66views more  COMPSEC 2007»
15 years 3 months ago
Measuring, analyzing and predicting security vulnerabilities in software systems
Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
68
Voted
COMPSEC
2007
58views more  COMPSEC 2007»
15 years 3 months ago
A video game for cyber security training and awareness
Benjamin D. Cone, Cynthia E. Irvine, Michael F. Th...
94
Voted
COMPSEC
2007
171views more  COMPSEC 2007»
15 years 3 months ago
Masquerade detection by boosting decision stumps using UNIX commands
Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousu...
107
Voted
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 3 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari