Sciweavers

300 search results - page 40 / 60
» Enterprise Security: A Community of Interest Based Approach
Sort
View
CSCL
2007
114views more  CSCL 2007»
13 years 7 months ago
Community-based learning: The core competency of residential, research-based universities
Traditionally, universities focus primarily on instructionist teaching. Such an understanding has been criticized from theoretical and practical points of view. We believe that so...
Gerhard Fischer, Markus Rohde, Volker Wulf
SIGKDD
2008
149views more  SIGKDD 2008»
13 years 7 months ago
Knowledge discovery from sensor data (SensorKDD)
Wide-area sensor infrastructures, remote sensors, RFIDs, and wireless sensor networks yield massive volumes of disparate, dynamic, and geographically distributed data. As such sen...
Ranga Raju Vatsavai, Olufemi A. Omitaomu, Joao Gam...
SIGIR
2010
ACM
13 years 11 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
POPL
2006
ACM
14 years 7 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...