Sciweavers

2874 search results - page 499 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICSEA
2009
IEEE
13 years 9 months ago
Validation of Scenario-Based Business Requirements with Coloured Petri Nets
A scenario can be used to describe a possible instantiation of a given business use case and can be expressed for example as a list of steps written in natural language, or by an ...
Óscar R. Ribeiro, João M. Fernandes
CVPR
2011
IEEE
13 years 6 months ago
Monocular 3D Scene Understanding with Explicit Occlusion Reasoning
Scene understanding from a monocular, moving camera is a challenging problem with a number of applications including robotics and automotive safety. While recent systems have show...
Christian Wojek, Stefan Walk, Stefan Roth, Bernt S...
DIMVA
2011
13 years 2 months ago
What's Clicking What? Techniques and Innovations of Today's Clickbots
Abstract. With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fra...
Brad Miller, Paul Pearce, Chris Grier, Christian K...
JUCS
2008
186views more  JUCS 2008»
13 years 11 months ago
A Safe Dynamic Adaptation Framework for Aspect-Oriented Software Development
: One focus of current software development is the re-use of components in the construction of systems. Software Adaptation facilitates the consequent need to adapt these component...
Miguel Ángel Pérez Toledano, Amparo ...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 5 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...