Sciweavers

3451 search results - page 570 / 691
» Collaborative attack modeling
Sort
View
KDD
2004
ACM
106views Data Mining» more  KDD 2004»
14 years 9 months ago
Early detection of insider trading in option markets
"Inside information" comes in many forms: knowledge of a corporate takeover, a terrorist attack, unexpectedly poor earnings, the FDA's acceptance of a new drug, etc...
Steve Donoho
CHI
2006
ACM
14 years 9 months ago
A fisheye follow-up: further reflections on focus + context
Information worlds continue to grow, posing daunting challenges for interfaces. This paper tries to increase our understanding of approaches to the problem, building on the Genera...
George W. Furnas
ICSE
2007
IEEE-ACM
14 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
WISTP
2010
Springer
14 years 4 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
ACSAC
2009
IEEE
14 years 4 months ago
SecureMR: A Service Integrity Assurance Framework for MapReduce
—MapReduce has become increasingly popular as a powerful parallel data processing model. To deploy MapReduce as a data processing service over open systems such as service orient...
Wei Wei, Juan Du, Ting Yu, Xiaohui Gu