Sciweavers

1521 search results - page 226 / 305
» Role analysis
Sort
View
ATAL
2008
Springer
14 years 17 hour ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CCS
2008
ACM
14 years 12 hour ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
AVBPA
2005
Springer
326views Biometrics» more  AVBPA 2005»
13 years 12 months ago
Rank-Based Decision Fusion for 3D Shape-Based Face Recognition
In 3D face recognition systems, 3D facial shape information plays an important role. Various shape representations have been proposed in the literature. The most popular techniques...
Berk Gökberk, Albert Ali Salah, Lale Akarun
EMS
2008
IEEE
13 years 11 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
LREC
2010
147views Education» more  LREC 2010»
13 years 11 months ago
Interacting Semantic Layers of Annotation in SoNaR, a Reference Corpus of Contemporary Written Dutch
This paper reports on the annotation of a corpus of 1 million words with four semantic annotation layers, including named entities, coreference relations, semantic roles and spati...
Ineke Schuurman, Véronique Hoste, Paola Mon...