Sciweavers

2270 search results - page 332 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
CSREASAM
2006
15 years 5 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ISTAR
2008
15 years 5 months ago
Improving the Syntax and Semantics of Goal Modelling Languages
One major obstacle to requirements engineering (RE) is the growing complexity of today's systems. Such a complexity can only be fficiently by powerful abstraction mechanisms a...
Raimundas Matulevicius
CRYPTO
2003
Springer
187views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (thi...
Salil P. Vadhan
ECIS
2003
15 years 5 months ago
Assessing the performance of an electronic marketplace: a conceptual model and case study
Theories of inter-organisational co-ordination propose that information processing capabilities (structure, process and technology) must be aligned with information processing nee...
Philip O'Reilly, Pat Finnegan
ECCV
2002
Springer
16 years 6 months ago
Visual Data Fusion for Objects Localization by Active Vision
Visual sensors provide exclusively uncertain and partial knowledge of a scene. In this article, we present a suitable scene knowledge representation that makes integration and fusi...
François Chaumette, Grégory Flandin