Sciweavers

271 search results - page 21 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
JOI
2007
52views more  JOI 2007»
13 years 7 months ago
The h-index: Advantages, limitations and its relation with other bibliometric indicators at the micro level
The relationship of the h-index with other bibliometric indicators at the micro level is analysed for Spanish CSIC scientists in Natural Resources, using publications downloaded f...
Rodrigo Costas, María Bordons
BMCBI
2010
144views more  BMCBI 2010»
13 years 7 months ago
Identifying overrepresented concepts in gene lists from literature: a statistical approach based on Poisson mixture model
Background: Large-scale genomic studies often identify large gene lists, for example, the genes sharing the same expression patterns. The interpretation of these gene lists is gen...
Xin He, Moushumi Sen Sarma, Xu Ling, Brant W. Chee...
EOR
2011
127views more  EOR 2011»
13 years 2 months ago
Methodology for determining the acceptability of system designs in uncertain environments
In practice, managers often wish to ascertain that a particular engineering design of a production system meets their requirements. The future environment of this design is likely...
Jack P. C. Kleijnen, Henri Pierreval, Jin Zhang
BMCBI
2004
146views more  BMCBI 2004»
13 years 7 months ago
Defining transcriptional networks through integrative modeling of mRNA expression and transcription factor binding data
Background: Functional genomics studies are yielding information about regulatory processes in the cell at an unprecedented scale. In the yeast S. cerevisiae, DNA microarrays have...
Feng Gao, Barrett C. Foat, Harmen J. Bussemaker