Sciweavers

471 search results - page 56 / 95
» An information systems auditor's profile
Sort
View
JCS
2002
115views more  JCS 2002»
13 years 7 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
IC
2004
13 years 9 months ago
A Scheme for Personalized Bookmark Services in a Mobile Agent Environment
Recent popularity of web-enabled mobile devices such as handheld devices and PDAs has made mobile Internet access very popular. However, considering the limitation of mobile devic...
Sohryun Shin, Eenjun Hwang
APCCM
2009
13 years 8 months ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
14 years 8 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
ENTER
2009
Springer
14 years 2 months ago
Personalized Mobile City Transport Advisory System
Mobile devices are becoming an inseparable part of our lives and personalized location-based mobile services are gaining more and more popularity. The scope of this paper is to il...
Gytis Tumas, Francesco Ricci