Sciweavers

245 search results - page 1 / 49
» The Iterated Weakest Link
Sort
View
104
Voted
IEEESP
2010
99views more  IEEESP 2010»
15 years 2 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
233
Voted
CVPR
2011
IEEE
15 years 8 hour ago
Finding the Weakest Link in Person Detectors
Detecting people remains a popular and challenging problem in computer vision. In this paper, we analyze parts-based models for person detection to determine which components of t...
Devi Parikh, Larry Zitnick
98
Voted
IEEESP
2006
52views more  IEEESP 2006»
15 years 3 months ago
Strengthening the Weakest Link in Digital Protection
William Suchan, Edward Sobiesk
151
Voted
TELSYS
2010
132views more  TELSYS 2010»
14 years 10 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
209
Voted
ALC
1997
15 years 4 months ago
Predicative semantics of loops
A predicative semantics is a mapping of programs to predicates. These predicates characterize sets of acceptable observations. The presence of time in the observations makes the o...
Theodore S. Norvell