Sciweavers

544 search results - page 22 / 109
» Using Architectural Models to Predict the Maintainability of...
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
ACSAC
2009
IEEE
14 years 2 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
ICTAI
2007
IEEE
14 years 1 months ago
ExOpaque: A Framework to Explain Opaque Machine Learning Models Using Inductive Logic Programming
In this paper we developed an Inductive Logic Programming (ILP) based framework ExOpaque that is able to extract a set of Horn clauses from an arbitrary opaque machine learning mo...
Yunsong Guo, Bart Selman
ICSE
2001
IEEE-ACM
14 years 13 hour ago
A Web-Oriented Architectural Aspect for the Emerging Computational Tapestry
An emerging tapestry of computations will soon integrate systems around the globe. It will evolve without central control. Its complexity will be vast. We need new ideas, tools an...
Kevin J. Sullivan, Avneesh Saxena
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
14 years 1 months ago
Bridging Business Value Models and Process Models in Aviation Value Webs via Possession Rights
While exploring value webs -cooperating enterprises- it is common to view such webs from multiple perspectives: (1) the business value perspective, (2) the business process perspe...
Vincent Pijpers, Jaap Gordijn