Sciweavers

495 search results - page 91 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
IJSKD
2011
163views more  IJSKD 2011»
13 years 2 months ago
Socio-Technical Systems: A Meta-Design Perspective
Meta-design of socio-technical systems is an approach which complies with the need of integrating two different types of structures and processes: technical systems which are engi...
Gerhard Fischer, Thomas Herrmann
ICSEA
2009
IEEE
14 years 2 months ago
Ontology Driven E-Government
: This paper presents an approach to model ontologies for the e-Government domain as a basis for an integrated e-Government environment. Over the last couple of years the applicati...
Peter Salhofer, Bernd Stadlhofer, Gerald Tretter
DAWAK
2005
Springer
13 years 9 months ago
Incremental Data Mining Using Concurrent Online Refresh of Materialized Data Mining Views
Abstract. Data mining is an iterative process. Users issue series of similar data mining queries, in each consecutive run slightly modifying either the definition of the mined dat...
Mikolaj Morzy, Tadeusz Morzy, Marek Wojciechowski,...
AAAI
2006
13 years 9 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 7 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari