Sciweavers

711 search results - page 110 / 143
» formats 2008
Sort
View
USS
2008
14 years 11 months ago
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits
Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
Marco Cova, Christopher Kruegel, Giovanni Vigna
WSC
2008
14 years 11 months ago
Automating the development of Shipyard manufacturing models
Simulation results are often needed within a short time frame, while the development of simulation models can be time consuming. We develop a methodology to facilitate rapid gener...
Gabriel A. Burnett, Deborah J. Medeiros, Daniel A....
ACMACE
2008
ACM
14 years 11 months ago
BeatBender: subsumption architecture for autonomous rhythm generation
BeatBender is a computer music project that explores a new method for generating emergent rhythmic drum patterns using the subsumption architecture. Rather than explicitly coding ...
Aaron Levisohn, Philippe Pasquier
ATAL
2008
Springer
14 years 11 months ago
Discovering tactical behavior patterns supported by topological structures in soccer agent domains
Behaviors in soccer-agent domains can involve individual plays, several players involved in tactical plays or the whole team trying to follow strategies supported by specific form...
Fernando Ramos, Huberto Ayanegui
ATAL
2008
Springer
14 years 11 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...