Sciweavers

54 search results - page 7 / 11
» compsec 2008
Sort
View
COMPSEC
2006
132views more  COMPSEC 2006»
13 years 7 months ago
Tightening the net: A review of current and next generation spam filtering tools
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it. The pap...
James Carpinter, Ray Hunt
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 7 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
COMPSEC
2004
156views more  COMPSEC 2004»
13 years 7 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 7 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
COMPSEC
2004
115views more  COMPSEC 2004»
13 years 7 months ago
On risk: perception and direction
The idea of risk permeates the information security field. We use terms like ``risk management'', ``risk assessment'', ``risk model'' and ``risk analy...
Andrew Stewart