Sciweavers

137 search results - page 8 / 28
» Case Analysis of Criminal Behaviour
Sort
View
PKDD
1999
Springer
130views Data Mining» more  PKDD 1999»
13 years 11 months ago
OPTICS-OF: Identifying Local Outliers
: For many KDD applications finding the outliers, i.e. the rare events, is more interesting and useful than finding the common cases, e.g. detecting criminal activities in E-commer...
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. ...
CCS
2006
ACM
13 years 11 months ago
Using model-based security analysis in component-oriented system development
We propose an integrated process for component-based system development and security risk analysis. The integrated process is evaluated in a case study involving an instant messag...
Gyrd Brændeland, Ketil Stølen
CCS
2010
ACM
13 years 7 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
ISPEC
2007
Springer
14 years 1 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
FATES
2004
Springer
14 years 24 days ago
Specifying and Generating Test Cases Using Observer Automata
We present a technique for specifying coverage criteria and a method for generating test suites for systems whose behaviours can be described as extended finite state machines (EF...
Johan Blom, Anders Hessel, Bengt Jonsson, Paul Pet...