Sciweavers

66 search results - page 5 / 14
» A scalable approach to attack graph generation
Sort
View
SAS
2004
Springer
103views Formal Methods» more  SAS 2004»
14 years 29 days ago
A Scalable Nonuniform Pointer Analysis for Embedded Programs
Abstract. In this paper we present a scalable pointer analysis for embedded applications that is able to distinguish between instances of recursively defined data structures and e...
Arnaud Venet
AAAI
2006
13 years 9 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
CIKM
2008
Springer
13 years 9 months ago
On effective presentation of graph patterns: a structural representative approach
In the past, quite a few fast algorithms have been developed to mine frequent patterns over graph data, with the large spectrum covering many variants of the problem. However, the...
Chen Chen, Cindy Xide Lin, Xifeng Yan, Jiawei Han
JIPS
2010
195views more  JIPS 2010»
13 years 2 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
ICCCN
2008
IEEE
14 years 2 months ago
A Position-Based Deployment and Routing Approach for Directional Wireless Mesh Networks
—Observing that simplicity implies efficiency and scalability, this paper proposes a position-based deployment and routing strategy, and then gives a concrete approach under this...
Weisheng Si, Selvakennedy Selvadurai