Sciweavers

COMPSEC
2007
171views more  COMPSEC 2007»
13 years 11 months ago
Masquerade detection by boosting decision stumps using UNIX commands
Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousu...
COMPSEC
2007
52views more  COMPSEC 2007»
13 years 11 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
COMPSEC
2007
58views more  COMPSEC 2007»
13 years 11 months ago
A video game for cyber security training and awareness
Benjamin D. Cone, Cynthia E. Irvine, Michael F. Th...
COMPSEC
2007
92views more  COMPSEC 2007»
13 years 11 months ago
Clustering subjects in a credential-based access control framework
Konstantina Stoupa, Athena Vakali
COMPSEC
2007
63views more  COMPSEC 2007»
13 years 11 months ago
Biometric attack vectors and defences
Chris Roberts
COMPSEC
2007
66views more  COMPSEC 2007»
13 years 11 months ago
Measuring, analyzing and predicting security vulnerabilities in software systems
Omar H. Alhazmi, Yashwant K. Malaiya, Indrajit Ray
COMPSEC
2007
78views more  COMPSEC 2007»
13 years 11 months ago
Security for a Multi-Agent System based on JADE
Xosé A. Vila Sobrino, A. Schuster, Adolfo R...