Sciweavers

109 search results - page 4 / 22
» Trends in Security Product Evaluations
Sort
View
CLEF
2011
Springer
12 years 7 months ago
Towards a Living Lab for Information Retrieval Research and Development - A Proposal for a Living Lab for Product Search Tasks
Abstract. The notion of having a “living lab” to undertaken evaluations has been proposed by a number of proponents within the field of Information Retrieval (IR). However, wh...
Leif Azzopardi, Krisztian Balog
IIWAS
2007
13 years 9 months ago
An Extensible Framework for Database Security Assessment and Visualization
By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Tran Khanh Dang, Thieu Hoa Le, Duy Tin Truong
CCS
2007
ACM
14 years 1 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
ACSAC
2006
IEEE
14 years 1 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy