Sciweavers

211 search results - page 28 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
ASWEC
2000
IEEE
13 years 12 months ago
Implementing an Experience Factory Based on Existing Organizational Knowledge
This paper describes the development of an experience factory in an Australian organization involved in the field of telecommunications. Faced with improvement needs, in 1998 the ...
Arne Koennecker, D. Ross Jeffery, Graham C. Low
CSDA
2008
147views more  CSDA 2008»
13 years 7 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach
WCRE
2003
IEEE
14 years 22 days ago
Predicting Maintainability with Object-Oriented Metrics - An Empirical Comparison
A large number of metrics have been proposed for measuring properties of object-oriented software such as size, inheritance, cohesion and coupling. We have been investigating whic...
Melis Dagpinar, Jens H. Jahnke
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
ICC
2009
IEEE
107views Communications» more  ICC 2009»
14 years 2 months ago
Dynamic Resource Modeling for Heterogeneous Wireless Networks
— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...