Sciweavers

986 search results - page 111 / 198
» Protecting the Intranet Against
Sort
View
ACSW
2006
13 years 9 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer
DBSEC
2006
125views Database» more  DBSEC 2006»
13 years 9 months ago
Aspect-Oriented Risk Driven Development of Secure Applications
Abstract. Security breaches seldom occur because of faulty security mechanisms. Often times, security mechanisms are incorrectly incorporated in an application which allows them to...
Geri Georg, Siv Hilde Houmb, Indrakshi Ray
ICAI
2004
13 years 9 months ago
Action Inhibition
An explicit exploration strategy is necessary in reinforcement learning (RL) to balance the need to reduce the uncertainty associated with the expected outcome of an action and the...
Myriam Abramson
ISCAPDCS
2004
13 years 9 months ago
An Open Digest-based Technique for Spam Detection
A promising anti-spam technique consists in collecting users opinions that given email messages are spam and using this collective judgment to block message propagation to other u...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ICIS
2001
13 years 9 months ago
Looking Without Seeing: Understanding Unsophisticated Consumers' Success and Failure to Detect Internet Deception
Do unsophisticated consumers fall prey to Internet consumer frauds? Why? To answer these questions this paper integrates two streams of empirical research: the process-oriented th...
Stefano Grazioli, Alex Wang