Sciweavers

762 search results - page 110 / 153
» Modeling and Simulating Information Security Management
Sort
View
SAC
2006
ACM
14 years 1 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
ESORICS
2008
Springer
13 years 9 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
SCANGIS
2003
13 years 9 months ago
Spatio-Temporal Modeling of Dynamic Phenomena in GIS
Although, most of phenomena change over time, there has been an attempt to model the phenomena of real world assuming a static nature for them. Even when changes occurred in the p...
Saeed Nadi, Mahmoud Reza Delavar
WSC
2007
13 years 10 months ago
Hospital capacity planning for efficient disaster mitigation during a bioterrorist attack
Effective hospital capacity planning can not only significantly enhance the capability and effectiveness of the treatment provided to patients during a bioterrorist attack but can...
Jomon Aliyas Paul, Govind Hariharan