Sciweavers

144 search results - page 10 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 7 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
JASSS
1998
82views more  JASSS 1998»
13 years 7 months ago
Qualitative modeling and simulation of socio-economic phenomena
This paper describes an application of recently developed qualitative reasoning techniques to complex, socio{economic allocation problems. We explain why we believe traditional op...
Giorgio Brajnik, Marji Lines
DMIN
2009
144views Data Mining» more  DMIN 2009»
13 years 5 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
KBSE
2005
IEEE
14 years 1 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso