Sciweavers

1744 search results - page 220 / 349
» The Steganographic File System
Sort
View
147
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 4 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
CHI
2008
ACM
16 years 4 months ago
Expandable grids for visualizing and authoring computer security policies
We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions pol...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
CCS
2009
ACM
15 years 11 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
TACAS
2000
Springer
149views Algorithms» more  TACAS 2000»
15 years 7 months ago
Proof General: A Generic Tool for Proof Development
This note describes Proof General, a tool for developing machine proofs with an interactive proof assistant. Interaction is based around a proof script, which is the target of a pr...
David Aspinall