Sciweavers

683 search results - page 85 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
194
Voted
CCS
2011
ACM
14 years 3 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
127
Voted
ACSAC
2006
IEEE
15 years 9 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
101
Voted
ISBI
2008
IEEE
16 years 4 months ago
Towards digital representation of Drosophila embryogenesis
Animal development can be described as a complex, threedimensional cellular system that changes dramatically across time as a consequence of cell proliferation, differentiation an...
Stephan Preibisch, Radoslaw Ejsmont, Torsten Rohlf...
145
Voted
BMCBI
2010
164views more  BMCBI 2010»
15 years 3 months ago
Investigating the validity of current network analysis on static conglomerate networks by protein network stratification
Background: A molecular network perspective forms the foundation of systems biology. A common practice in analyzing protein-protein interaction (PPI) networks is to perform networ...
Minlu Zhang, Long J. Lu
BMCBI
2005
125views more  BMCBI 2005»
15 years 3 months ago
Query3d: a new method for high-throughput analysis of functional residues in protein structures
Background: The identification of local similarities between two protein structures can provide clues of a common function. Many different methods exist for searching for similar ...
Gabriele Ausiello, Allegra Via, Manuela Helmer-Cit...