Sciweavers

412 search results - page 15 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
BMCBI
2007
126views more  BMCBI 2007»
13 years 8 months ago
Including probe-level uncertainty in model-based gene expression clustering
Background: Clustering is an important analysis performed on microarray gene expression data since it groups genes which have similar expression patterns and enables the explorati...
Xuejun Liu, Kevin K. Lin, Bogi Andersen, Magnus Ra...
JSW
2008
220views more  JSW 2008»
13 years 8 months ago
Empirical validation of Software development effort multipliers of Intermediate COCOMO Model
Intermediate COCOMO Model computes effort as a function of program size and a set of cost drivers. Effort adjustment factor (EAF) is calculated using 15 cost drivers. EAF is an imp...
M. J. Basavaraj, K. C. Shet
ITSSA
2006
76views more  ITSSA 2006»
13 years 8 months ago
Reliability Self-Assessment in Reactive Autonomic Systems: Autonomic System-Time Reactive Model Approach
Abstract: This paper targets the reactive autonomic system's self-monitoring of one of the most important nonfunctional properties, reliability. There are currently no adequat...
Olga Ormandjieva, Heng Kuang, Emil Vassev
ACSAC
2006
IEEE
14 years 15 days ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
ACSAC
2004
IEEE
14 years 15 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia