Sciweavers

446 search results - page 26 / 90
» A Study of Dead Data Members in C Applications
Sort
View
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
13 years 11 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
MICCAI
2005
Springer
14 years 8 months ago
76-Space Analysis of Grey Matter Diffusivity: Methods and Applications
Diffusion Weighted Imaging (DWI) and Diffusion Tensor Imaging (DTI) are widely used in the study and diagnosis of neurological diseases involving the White Matter (WM). However, ma...
Tianming Liu, Geoffrey Young, Ling Huang, Nankuei ...
CCS
2008
ACM
13 years 9 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
CSDA
2010
99views more  CSDA 2010»
13 years 7 months ago
Robust M-estimation of multivariate GARCH models
In empirical work on multivariate financial time series, it is common to postulate a Multivariate GARCH model. We show that the popular Gaussian quasi-maximum likelihood estimator...
Kris Boudt, Christophe Croux
CTRSA
2012
Springer
285views Cryptology» more  CTRSA 2012»
12 years 3 months ago
Plaintext-Checkable Encryption
We study the problem of searching on encrypted data, where the search is performed using a plaintext message or a keyword, rather than a message-specific trapdoor as done by state...
Sébastien Canard, Georg Fuchsbauer, Aline G...