Sciweavers

780 search results - page 147 / 156
» Learning Low-Density Separators
Sort
View
VIZSEC
2007
Springer
14 years 2 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
WILF
2007
Springer
170views Fuzzy Logic» more  WILF 2007»
14 years 2 months ago
Time-Series Alignment by Non-negative Multiple Generalized Canonical Correlation Analysis
Background: Quantitative analysis of differential protein expressions requires to align temporal elution measurements from liquid chromatography coupled to mass spectrometry (LC/M...
Bernd Fischer, Volker Roth, Joachim M. Buhmann
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 2 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
WOSP
2005
ACM
14 years 2 months ago
A model transformation framework for the automated building of performance models from UML models
In order to effectively validate the performance of software systems throughout their development cycle it is necessary to continuously build performance models from software mod...
Andrea D'Ambrogio
CCS
2005
ACM
14 years 2 months ago
A model and architecture for pseudo-random generation with applications to /dev/random
We present a formal model and a simple architecture for robust pseudorandom generation that ensures resilience in the face of an observer with partial knowledge/control of the gen...
Boaz Barak, Shai Halevi