Sciweavers

405 search results - page 4 / 81
» Avatar-centric Risk Evaluation
Sort
View
ICCSA
2005
Springer
14 years 2 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
CCS
2006
ACM
14 years 8 days ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
ICASSP
2011
IEEE
13 years 7 days ago
Driver risk evaluation based on acceleration, deceleration, and steering behavior
We propose a driver risk evaluation method based on the analysis of driving data captured with drive recorders. To evaluate the acceleration behavior of each driver we plot the ma...
Chiyomi Miyajima, Hiroki Ukai, Atsumi Naito, Hideo...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
14 years 2 months ago
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
— Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer beha...
Zhengqiang Liang, Weisong Shi
BIB
2011
13 years 4 days ago
Using cross-validation to evaluate predictive accuracy of survival risk classifiers based on high-dimensional data
Developments in whole genome biotechnology have stimulated statistical focus on prediction methods. We review here methodology for classifying patients into survival risk groups a...
Richard M. Simon, Jyothi Subramanian, Ming-Chung L...