Sciweavers

1411 search results - page 235 / 283
» Case Studies of an Insider Framework
Sort
View
IEEEARES
2010
IEEE
14 years 1 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
B
2007
Springer
14 years 25 days ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
GROUP
2007
ACM
14 years 21 days ago
Identity management: multiple presentations of self in facebook
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This researc...
Joan Morris DiMicco, David R. Millen
GIS
2009
ACM
14 years 21 days ago
Dynamic network data exploration through semi-supervised functional embedding
The paper presents a framework for semi-supervised nonlinear embedding methods useful for exploratory analysis and visualization of spatio-temporal network data. The method provid...
Alexei Pozdnoukhov
ICA3PP
2009
Springer
14 years 20 days ago
Finding Object Depth Using Stereoscopic Photography
Stereoscopic scenes of the mankind is naturally caused by synthesizing two images produced by the parallax of the two eyes of human. Such being the case, mankind can distinguish t...
Yu-Hua Lee, Tai-Pao Chuang