Sciweavers

479 search results - page 52 / 96
» Putting personas to work
Sort
View
SAC
2009
ACM
14 years 9 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
RAID
1999
Springer
13 years 12 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...
SAFECOMP
1999
Springer
13 years 12 months ago
Towards Statistical Control of an Industrial Test Process
We present an ongoing experience aimed at introducing statistical process control techniques to one crucial test phase, namely Function Test, of a real world software development p...
Gaetano Lombardi, Emilia Peciola, Raffaela Mirando...
AGENTS
1997
Springer
13 years 11 months ago
Adaptable Local Level Arbitration of Behaviors
During the last few years, and in an attempt to provide an ecient alternative to classical methods to designing robot control structures, the behavior-based approach has emerged....
Mohamed Salah Hamdi, Karl Kaiser
ACMICEC
2007
ACM
127views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Symbolic model checking of institutions
Norms defined by institutions and enforced by organizations have been put forward as a mechanism to increase the efficiency and reliability of electronic transactions carried out ...
Francesco Viganò, Marco Colombetti