Sciweavers

412 search results - page 26 / 83
» A Structural Framework for Modeling Multi-Stage Network Atta...
Sort
View
CCS
2006
ACM
13 years 11 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
CSB
2003
IEEE
130views Bioinformatics» more  CSB 2003»
14 years 28 days ago
Latent Structure Models for the Analysis of Gene Expression Data
Cluster methods have been successfully applied in gene expression data analysis to address tumor classification. By grouping tissue samples into homogeneous subsets, more systema...
Dong Hua, Dechang Chen, Xiuzhen Cheng, Abdou Youss...
JSW
2008
98views more  JSW 2008»
13 years 7 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
JSAC
2006
111views more  JSAC 2006»
13 years 7 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
CMOT
1999
105views more  CMOT 1999»
13 years 7 months ago
Friendship Networks Through Time: An Actor-Oriented Dynamic Statistical Network Model
We propose a class of actor-oriented statistical models for closed social networks in general, and friendship networks in particular. The models are random utility models develope...
Gerhard G. Van De Bunt, Marijtje A. J. Van Duijn, ...