Sciweavers

1278 search results - page 167 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
128
Voted
IROS
2007
IEEE
148views Robotics» more  IROS 2007»
15 years 9 months ago
Tractable probabilistic models for intention recognition based on expert knowledge
— Intention recognition is an important topic in human-robot cooperation that can be tackled using probabilistic model-based methods. A popular instance of such methods are Bayes...
Oliver C. Schrempf, David Albrecht, Uwe D. Hanebec...
176
Voted
MEDIAFORENSICS
2010
15 years 2 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
126
Voted
TKDE
2008
125views more  TKDE 2008»
15 years 3 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
148
Voted
CCS
2009
ACM
15 years 10 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
NCA
2007
IEEE
15 years 9 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...