Sciweavers

1186 search results - page 40 / 238
» A New Approach to Secure Logging
Sort
View
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
14 years 20 days ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
SAC
2004
ACM
14 years 1 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
ACL
2006
13 years 10 months ago
An Iterative Implicit Feedback Approach to Personalized Search
General information retrieval systems are designed to serve all users without considering individual needs. In this paper, we propose a novel approach to personalized search. It c...
Yuanhua Lv, Le Sun, Junlin Zhang, Jian-Yun Nie, Wa...
ICANN
2010
Springer
13 years 8 months ago
Tumble Tree - Reducing Complexity of the Growing Cells Approach
We propose a data structure that decreases complexity of unsupervised competitive learning algorithms which are based on the growing cells structures approach. The idea is based on...
Hendrik Annuth, Christian-A. Bohn
EUROCRYPT
2001
Springer
14 years 1 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith