Sciweavers

5722 search results - page 94 / 1145
» Security Function Interactions
Sort
View
IEEEARES
2008
IEEE
14 years 3 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
DIMVA
2011
13 years 10 days ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
ACSAC
1999
IEEE
14 years 1 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
APVIS
2010
13 years 10 months ago
Volume exploration using ellipsoidal Gaussian transfer functions
This paper presents an interactive transfer function design tool based on ellipsoidal Gaussian transfer functions (ETFs). Our approach explores volumetric features in the statisti...
Yunhai Wang, Wei Chen, Guihua Shan, Tingxin Dong, ...
BC
2007
81views more  BC 2007»
13 years 9 months ago
Cross-intensity functions and the estimate of spike-time jitter
Correlation measures are important tools for the analysis of simultaneously recorded spike trains. A well-known measure with probabilistic interpretation is the cross-intensity fun...
Richard H. R. Hahnloser