Sciweavers

211 search results - page 26 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
ACMSE
2005
ACM
14 years 1 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ICSM
2003
IEEE
14 years 23 days ago
Critical Success Factors in Software Maintenance-A Case Study
: The objective of this paper is to identify those factors, which are critical to the success of a maintenance operation in general and to apply them to a particular maintenance pr...
Harry M. Sneed, Peter Brössler
ICWS
2004
IEEE
13 years 8 months ago
A DAML-Based Repository for QoS-Aware Semantic Web Service Selection
The Web is moving toward a collection of interoperating Web services. Achieving this interoperability requires dynamic discovery of Web services on the basis of their capabilities...
A. Soydan Bilgin, Munindar P. Singh
ESORICS
2011
Springer
12 years 7 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
VRST
2006
ACM
14 years 1 months ago
Variations in physiological responses of participants during different stages of an immersive virtual environment experiment
This paper presents a study of the fine grain physiological responses of participants to an immersive virtual simulation of an urban environment. The analysis of differences in p...
Andrea Brogni, Vinoba Vinayagamoorthy, Anthony Ste...