Sciweavers

274 search results - page 29 / 55
» Improving vulnerability discovery models
Sort
View
HT
2010
ACM
14 years 23 days ago
Community-based ranking of the social web
The rise of social interactions on the Web requires developing new methods of information organization and discovery. To that end, we propose a generative community-based probabil...
Said Kashoob, James Caverlee, Krishna Kamath
ACSW
2004
13 years 9 months ago
A Market-based Rule Learning System
In this paper, a `market trading' technique is integrated with the techniques of rule discovery and refinement for data mining. A classifier system-inspired model, the market...
Qingqing Zhou, Martin K. Purvis
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 7 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ACSD
2007
IEEE
116views Hardware» more  ACSD 2007»
14 years 2 months ago
Finding Structure in Unstructured Processes: The Case for Process Mining
Today there are many process mining techniques that allow for the automatic construction of process models based on event logs. Unlike synthesis techniques (e.g., based on regions...
Wil M. P. van der Aalst, Christian W. Günther
UKCBR
1995
13 years 11 months ago
Self-Questioning and Experimentation: An Index Vocabulary of Situated Interaction
Various cognitive and computational models have addressed the use of previous experience to understand a new domain. In particular, research in case-based reasoning has explored t...
Rüdiger Oehlmann, Peter Edwards, Derek H. Sle...