Sciweavers

30 search results - page 4 / 6
» Security Rules Specification and Analysis Based on Passive T...
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ICIP
2005
IEEE
14 years 3 months ago
Combination of multiple extraction algorithms in the detection of facial features
Automated analysis of facial images for the estimation of the displayed expression is essential in the design of intuitive and accessible human computer interaction systems. In ex...
Spiros Ioannou, Manolis Wallace, Kostas Karpouzis,...
CCS
2009
ACM
14 years 1 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...
SPIN
2009
Springer
14 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
AAAI
1998
13 years 11 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...