Sciweavers

1428 search results - page 12 / 286
» aim 2010
Sort
View
NBIS
2010
Springer
13 years 4 months ago
Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation
This paper aims to find interested association rules, known as data mining technique, out of the dataset of downloading logs by focusing on the coordinated activity among downloadi...
Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada
SICHERHEIT
2010
13 years 4 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
WOA
2010
13 years 4 months ago
Documenting SODA: An Evaluation of the Process Documentation Template
This paper presents an experimental evaluation of the methodology documentation template proposed by the IEEE FIPA Design Process Documentation and Fragmentation working group [1]....
Ambra Molesini, Andrea Omicini
AMAI
2010
Springer
13 years 4 months ago
Comparing multiagent systems research in combinatorial auctions and voting
In a combinatorial auction, a set of resources is for sale, and agents can bid on subsets of these resources. In a voting setting, the agents decide among a set of alternatives by...
Vincent Conitzer
LLC
2010
13 years 1 months ago
Quantified Conditionals and Compositionality
The interpretation of conditionals in the scope of a quantifier (as in `No student will succeed if he goofs off') presents a troubling puzzle. Either we are forced to abandon...
Janneke Huitink