Sciweavers

1737 search results - page 270 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TCBB
2010
136views more  TCBB 2010»
15 years 25 days ago
Integrating Data Clustering and Visualization for the Analysis of 3D Gene Expression Data
— The recent development of methods for extracting precise measurements of spatial gene expression patterns from three-dimensional (3D) image data opens the way for new analyses ...
Oliver Rübel, Gunther H. Weber, Min-Yu Huang,...
SIGUCCS
2003
ACM
15 years 7 months ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow
150
Voted
CCS
2008
ACM
15 years 4 months ago
Tupni: automatic reverse engineering of input formats
Recent work has established the importance of automatic reverse engineering of protocol or file format specifications. However, the formats reverse engineered by previous tools ha...
Weidong Cui, Marcus Peinado, Karl Chen, Helen J. W...
WPES
2006
ACM
15 years 8 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
122
Voted
EUROSYS
2008
ACM
15 years 11 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos