Sciweavers

363 search results - page 35 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
DNA
2001
Springer
14 years 4 days ago
The Fidelity of the Tag-Antitag System
In the universal DNA chip method, target RNAs are mapped onto a set of DNA tags. Parallel hybridization of these tags with an indexed, complementary antitag array then provides an ...
John A. Rose, Russell J. Deaton, Masami Hagiya, Ak...
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ALIFE
1998
13 years 7 months ago
Evolution of Linguistic Diversity in a Simple Communication System
This article reports on the current state of our efforts to shed light on the origin and evolution of linguistic diversity using synthetic modeling and arti cial life es. We constr...
Takaya Arita, Yuhji Koyama
FC
2006
Springer
108views Cryptology» more  FC 2006»
13 years 11 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
SAINT
2003
IEEE
14 years 28 days ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh