Sciweavers

80
Voted
SPRINGSIM
2007
15 years 1 months ago
A security-centric ring-based software architecture
Jay-Evan J. Tevis, John A. Hamilton Jr.
81
Voted
SPRINGSIM
2007
15 years 1 months ago
Models of malicious behavior in sponsored search
Garud Iyengar, David J. Phillips, Clifford Stein
96
Voted
SPRINGSIM
2007
15 years 1 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
76
Voted
SPRINGSIM
2007
15 years 1 months ago
Cross command collaboration effort (3CE)
Brian K. Hobson, Donald W. Kroening
87
Voted
SPRINGSIM
2007
15 years 1 months ago
Understanding the structure of power law networks
Rex K. Kincaid, Michael J. Holroyd, Christopher Ga...
76
Voted
SPRINGSIM
2007
15 years 1 months ago
DoDAF limitations and enhancements for the Capability Test Methodology
David A. Dryer, Thomas Bock, Maria Broschi, Timoth...
137
Voted
SPRINGSIM
2007
15 years 1 months ago
Modeling and analysis of worm defense using stochastic activity networks
— Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling an...
David M. Nicol, Steve Hanna, Frank Stratton, Willi...