Sciweavers

6071 search results - page 1199 / 1215
» A management information repository for distributed applicat...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
SASN
2006
ACM
14 years 2 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia
CCS
2003
ACM
14 years 1 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
ICSE
2010
IEEE-ACM
14 years 1 months ago
Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows
We performed an empirical study to characterize factors that affect which bugs get fixed in Windows Vista and Windows 7, focusing on factors related to bug report edits and relat...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...
KDD
2010
ACM
253views Data Mining» more  KDD 2010»
14 years 19 days ago
Mining periodic behaviors for moving objects
Periodicity is a frequently happening phenomenon for moving objects. Finding periodic behaviors is essential to understanding object movements. However, periodic behaviors could b...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays, P...
« Prev « First page 1199 / 1215 Last » Next »