Sciweavers

154 search results - page 18 / 31
» Electromagnetic Analysis: Concrete Results
Sort
View
FAST
2009
13 years 5 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte
CEAS
2008
Springer
13 years 9 months ago
Social Honeypots: Making Friends With A Spammer Near You
Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spamme...
Steve Webb, James Caverlee, Calton Pu
ORGSCI
2008
54views more  ORGSCI 2008»
13 years 7 months ago
On the Problem of Participation in Strategy: A Critical Discursive Perspective
We still know little of why strategy processes often involve participation problems. In this paper, we argue that this crucial issue is linked to fundamental assumptions concernin...
Saku Mantere, Eero Vaara
IWSEC
2010
Springer
13 years 6 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
ICDAR
2011
IEEE
12 years 7 months ago
Functional-Based Table Category Identification in Digital Library
– Better understanding the document logical components is crucial to many applications, e.g., document classification or data integration. As the development of digital libraries...
Seongchan Kim, Ying Liu