Sciweavers

COMPSEC
2007
171views more  COMPSEC 2007»
14 years 11 months ago
Masquerade detection by boosting decision stumps using UNIX commands
Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousu...
73
Voted
COMPSEC
2007
52views more  COMPSEC 2007»
14 years 11 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
COMPSEC
2007
58views more  COMPSEC 2007»
14 years 11 months ago
A video game for cyber security training and awareness
Benjamin D. Cone, Cynthia E. Irvine, Michael F. Th...
COMPSEC
2007
92views more  COMPSEC 2007»
14 years 11 months ago
Clustering subjects in a credential-based access control framework
Konstantina Stoupa, Athena Vakali
62
Voted
COMPSEC
2007
63views more  COMPSEC 2007»
14 years 11 months ago
Biometric attack vectors and defences
Chris Roberts
70
Voted
COMPSEC
2007
93views more  COMPSEC 2007»
14 years 11 months ago
Functional similarities between computer worms and biological pathogens
Jun Li, Paul Knickerbocker
COMPSEC
2007
66views more  COMPSEC 2007»
14 years 11 months ago
Measuring, analyzing and predicting security vulnerabilities in software systems
Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
69
Voted
COMPSEC
2007
78views more  COMPSEC 2007»
14 years 11 months ago
Security for a Multi-Agent System based on JADE
Xosé A. Vila Sobrino, A. Schuster, Adolfo R...