Sciweavers

274 search results - page 11 / 55
» Improving vulnerability discovery models
Sort
View
DSN
2009
IEEE
14 years 2 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ACL
2012
11 years 10 months ago
A Nonparametric Bayesian Approach to Acoustic Model Discovery
We investigate the problem of acoustic modeling in which prior language-specific knowledge and transcribed data are unavailable. We present an unsupervised model that simultaneou...
Chia-ying Lee, James R. Glass
CVPR
2012
IEEE
11 years 10 months ago
3D landmark model discovery from a registered set of organic shapes
We present a machine learning framework that automatically generates a model set of landmarks for some class of registered 3D objects: here we use human faces. The aim is to repla...
Clement Creusot, Nick Pears, Jim Austin
ACL
2009
13 years 5 months ago
Employing Topic Models for Pattern-based Semantic Class Discovery
A semantic class is a collection of items (words or phrases) which have semantically peer or sibling relationship. This paper studies the employment of topic models to automatical...
Huibin Zhang, Mingjie Zhu, Shuming Shi, Ji-Rong We...