Sciweavers

36 search results - page 4 / 8
» Security Trend Analysis with CVE Topic Models
Sort
View
ICWSM
2009
13 years 5 months ago
Information Cascades in the Blogosphere: A Look Behind the Curtain
With an increasing number of people that read, write and comment on blogs, the blogosphere has established itself as an essential medium of communication. A fundamental characteri...
Manos Papagelis, Nilesh Bansal, Nick Koudas
CCS
2007
ACM
14 years 1 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 8 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
COMPSEC
2004
115views more  COMPSEC 2004»
13 years 7 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart
ISSA
2004
13 years 8 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha