Sciweavers

15781 search results - page 3084 / 3157
» Evaluating Information Extraction
Sort
View
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
ESOP
2003
Springer
14 years 2 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
EWSPT
2003
Springer
14 years 2 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir
GI
2003
Springer
14 years 2 months ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
« Prev « First page 3084 / 3157 Last » Next »