Sciweavers

109 search results - page 15 / 22
» Trends in Security Product Evaluations
Sort
View
GIL
2011
12 years 7 months ago
Information Services for Agri-Food Supply Chains - A Framework for Development
Abstract: Several global developments such as the growing demand for bioenergy, limits in the availability of water and diminishing production resources as well as sector-wide cris...
Richard J. Lehmann, Robert Reiche, Melanie Fritz, ...
ACSAC
2007
IEEE
14 years 1 months ago
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hish...
KDD
2003
ACM
149views Data Mining» more  KDD 2003»
14 years 8 months ago
Knowledge-based data mining
We describe techniques for combining two types of knowledge systems: expert and machine learning. Both the expert system and the learning system represent information by logical d...
Søren Damgaard, Sholom M. Weiss, Shubir Kap...
IJPP
2011
105views more  IJPP 2011»
13 years 2 months ago
Correlating Radio Astronomy Signals with Many-Core Hardware
A recent development in radio astronomy is to replace traditional dishes with many small antennas. The signals are combined to form one large, virtual telescope. The enormous data ...
Rob van Nieuwpoort, John W. Romein
CCS
2007
ACM
14 years 1 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu