Sciweavers

3451 search results - page 55 / 691
» Collaborative attack modeling
Sort
View
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 11 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su
IM
2007
13 years 10 months ago
Interactive Informatics on Internet Infrastructure
— We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, ...
F. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, ...
ACL
2008
13 years 10 months ago
Impact of Initiative on Collaborative Problem Solving
Even though collaboration in peer learning has been shown to have a positive impact for students, there has been little research into collaborative peer learning dialogues. We ana...
Cynthia Kersey
IWSEC
2007
Springer
14 years 3 months ago
Run-Time Randomization to Mitigate Tampering
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tri...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
IEEEARES
2006
IEEE
14 years 3 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...