Sciweavers

430 search results - page 69 / 86
» formats 2005
Sort
View
102
Voted
PCI
2005
Springer
15 years 3 months ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...
RE
2005
Springer
15 years 3 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
97
Voted
VISUAL
2005
Springer
15 years 3 months ago
Compressed Domain Image Retrieval Using JPEG2000 and Gaussian Mixture Models
We describe and compare three probabilistic ways to perform Content Based Image Retrieval (CBIR) in compressed domain using images in JPEG2000 format. Our main focus are arbitrary ...
Alexandra Teynor, Wolfgang Müller, Wolfgang L...
62
Voted
VIZSEC
2005
Springer
15 years 3 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
120
Voted
APN
2005
Springer
15 years 7 days ago
Timed-Arc Petri Nets vs. Networks of Timed Automata
Abstract. We establish mutual translations between the classes of 1safe timed-arc Petri nets (and its extension with testing arcs) and networks of timed automata (and its subclass ...
Jirí Srba