Sciweavers

1737 search results - page 261 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
117
Voted
CCS
2005
ACM
15 years 8 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
126
Voted
CHI
2008
ACM
16 years 2 months ago
The sound of touch: physical manipulation of digital sound
The Sound of Touch is a new tool for real-time capture and sensitive physical stimulation of sound samples using digital convolution. Our hand-held wand can be used to (1) record ...
David Merrill, Hayes Raffle, Roberto Aimi
150
Voted
KDD
2005
ACM
99views Data Mining» more  KDD 2005»
15 years 8 months ago
Disease progression modeling from historical clinical databases
This paper considers the problem of modeling disease progression from historical clinical databases, with the ultimate objective of stratifying patients into groups with clearly d...
Ronald K. Pearson, Robert J. Kingan, Alan Hochberg
155
Voted
AAAI
2006
15 years 4 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
139
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon