Sciweavers

1235 search results - page 70 / 247
» Formalizing information security knowledge
Sort
View
KCAP
2009
ACM
14 years 2 months ago
Overview of a semantic disambiguation method for unstructured web contexts
In this paper we give an overview of a multiontology disambiguation method, targeted to discover the intended meaning of words in unstructured web contexts. It receives an ambiguo...
Jorge Gracia, Eduardo Mena
SP
2007
IEEE
14 years 2 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
ECAI
2008
Springer
13 years 10 months ago
QuestSemantics - Intelligent Search and Retrieval of Business Knowledge
Keyword-based search engines, though hugely popular, are limited when trying to answer very specific queries. The processing of search results is performed by users, rather than th...
Ian Blacoe, Ignazio Palmisano, Valentina A. M. Tam...
AAAI
2010
13 years 9 months ago
Reasoning about Imperfect Information Games in the Epistemic Situation Calculus
Approaches to reasoning about knowledge in imperfect information games typically involve an exhaustive description of the game, the dynamics characterized by a tree and the incomp...
Vaishak Belle, Gerhard Lakemeyer
TCOS
2010
13 years 2 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin