Sciweavers

223 search results - page 40 / 45
» Dual Strategy Active Learning
Sort
View
SEC
2008
13 years 9 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
PSYCHNOLOGY
2006
102views more  PSYCHNOLOGY 2006»
13 years 7 months ago
Radiology Informatics and Work Flow Redesign
The transformation from film-based to filmless operations has become more and more challenging as medical imaging studies expand in size and complexity. To adapt to these changes ...
Guido Vaccari, Carlo Saccavini
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 8 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
ESSOS
2009
Springer
14 years 2 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
CCIA
2005
Springer
14 years 1 months ago
Classifying Natural Objects on Outdoor Scenes
We propose an hybrid and probabilistic classification of image regions belonging to scenes primarily containing natural objects, e.g. sky, trees, etc. as a first step in solving ...
Anna Bosch, Xavier Muñoz, Joan Martí...