Sciweavers

SPRINGSIM
2007
13 years 12 months ago
A security-centric ring-based software architecture
Jay-Evan J. Tevis, John A. Hamilton Jr.
SPRINGSIM
2007
13 years 12 months ago
Models of malicious behavior in sponsored search
Garud Iyengar, David J. Phillips, Clifford Stein
SPRINGSIM
2007
13 years 12 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
SPRINGSIM
2007
13 years 12 months ago
Cross command collaboration effort (3CE)
Brian K. Hobson, Donald W. Kroening
SPRINGSIM
2007
13 years 12 months ago
Understanding the structure of power law networks
Rex K. Kincaid, Michael J. Holroyd, Christopher Ga...
SPRINGSIM
2007
13 years 12 months ago
DoDAF limitations and enhancements for the Capability Test Methodology
David A. Dryer, Thomas Bock, Maria Broschi, Timoth...
SPRINGSIM
2007
13 years 12 months ago
Modeling and analysis of worm defense using stochastic activity networks
— Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling an...
David M. Nicol, Steve Hanna, Frank Stratton, Willi...