Sciweavers

1407 search results - page 169 / 282
» Systems Theory Model for Information Security
Sort
View
SCL
2010
95views more  SCL 2010»
13 years 6 months ago
Is measurement-based feedback still better for quantum control systems?
In this paper, we put forward a fundamental question concerning feedback control of quantum systems: Is measurement-based feedback control still better than openloop control? In c...
Bo Qi, Lei Guo
ACSAC
2003
IEEE
14 years 7 hour ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
NN
2006
Springer
141views Neural Networks» more  NN 2006»
13 years 8 months ago
Encoding uncertainty in the hippocampus
The medial temporal lobe may play a critical role in binding successive events into memory while encoding contextual information in implicit and explicit memory tasks. Information...
Lee M. Harrison, Andrew Duggins, Karl J. Friston
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
14 years 1 months ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...
RECSYS
2009
ACM
14 years 1 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley