Sciweavers

216 search results - page 10 / 44
» Modeling and Automated Containment of Worms
Sort
View
GI
2005
Springer
14 years 1 months ago
Automated Quality Assurance for UML Models
Abstract: Model based development, like proposed by the OMG’s Model Driven Arre (MDA), aims to raise the level of abstraction from working on the code to working with models. For...
Tilman Seifert, Florian Jug, Günther Rackl
ICDCS
2010
IEEE
13 years 11 months ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
CVPR
2007
IEEE
14 years 9 months ago
Automated Individualization of Deformable Eye Region Model and Its Application to Eye Motion Analysis
This paper proposes a method of automated individualization of eye region model. The eye region model has been proposed in past research that parameterizes both the structure and ...
Tsuyoshi Moriyama, Takeo Kanade
STTT
2008
87views more  STTT 2008»
13 years 7 months ago
ProB: an automated analysis toolset for the B method
We present ProB, a validation toolset for the B method. ProB's automated animation facilities allow users to gain confidence in their specifications. ProB also contains a mode...
Michael Leuschel, Michael J. Butler
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 9 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel