Sciweavers

161 search results - page 12 / 33
» Secure Databases: An Analysis of Clark-Wilson Model in a Dat...
Sort
View
ICDAR
2009
IEEE
13 years 5 months ago
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model
Hybrid of Neural Network (NN) and Hidden Markov Model (HMM) has been popular in word recognition, taking advantage of NN discriminative property and HMM representational capabilit...
Abdul Rahim Ahmad, Christian Viard-Gaudin, Marzuki...
FAST
2009
13 years 5 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte
CCS
2007
ACM
14 years 1 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
WSC
2001
13 years 8 months ago
Modeling risk in the dynamic environment of maritime transportation
The Washington State Ferries are one of the largest ferry systems in the world. Accidents involving Washington State Ferries are rare events. However, low probability, high conseq...
Jason R. W. Merrick, J. René van Dorp, Thom...
DSN
2003
IEEE
14 years 20 days ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...