Sciweavers

495 search results - page 56 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
CVPR
2012
IEEE
12 years 3 days ago
Bridging the past, present and future: Modeling scene activities from event relationships and global rules
This paper addresses the discovery of activities and learns the underlying processes that govern their occurrences over time in complex surveillance scenes. To this end, we propos...
Jagannadan Varadarajan, Rémi Emonet, Jean-M...
ASWEC
2008
IEEE
14 years 4 months ago
Modeling Input Validation in UML
Security is an integral part of most software systems but it is not considered as an explicit part in the development process yet. Input validation is the most critical part of so...
Pedram Hayati, Nastaran Jafari, S. Mohammad Rezaei...
IEEESP
2008
136views more  IEEESP 2008»
13 years 9 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
EWMF
2005
Springer
14 years 3 months ago
Semi-automatic Construction of Topic Ontologies
In this paper, we review two techniques for topic discovery in collections of text documents (Latent Semantic Indexing and K-Means clustering) and present how we integrated them in...
Blaz Fortuna, Dunja Mladenic, Marko Grobelnik
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 7 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...