Sciweavers

213 search results - page 43 / 43
» Monotonicity in Rule Based Update
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
AC
2005
Springer
13 years 7 months ago
The state of artificial intelligence
Artificial intelligence has been an active branch of research for computer scientists and psychologists for 50 years. The concept of mimicking human intelligence in a computer fue...
Adrian A. Hopgood
RE
2008
Springer
13 years 7 months ago
Generating Natural Language specifications from UML class diagrams
Early phases of software development are known to be problematic, difficult to manage and errors occurring during these phases are expensive to correct. Many systems have been deve...
Farid Meziane, Nikos Athanasakis, Sophia Ananiadou