Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Buffett, Scott"'
Autor:
Mamun, Mohammad, Buffett, Scott
Publikováno v:
Information and Communications Security. 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings Sep 2022 Pages 546-565
Audit logs containing system level events are frequently used for behavior modeling as they can provide detailed insight into cyber-threat occurrences. However, mapping low-level system events in audit logs to highlevel behaviors has been a major cha
Externí odkaz:
http://arxiv.org/abs/2312.07575
Autor:
Xiong, Pulei, Buffett, Scott, Iqbal, Shahrear, Lamontagne, Philippe, Mamun, Mohammad, Molyneaux, Heather
Publikováno v:
Journal of Information Security and Applications 65 (2022) 103121
While Machine Learning (ML) technologies are widely adopted in many mission critical fields to support intelligent decision-making, concerns remain about system resilience against ML-specific security attacks and privacy breaches as well as the trust
Externí odkaz:
http://arxiv.org/abs/2101.03042
Autor:
Xiong, Pulei, Buffett, Scott, Iqbal, Shahrear, Lamontagne, Philippe, Mamun, Mohammad, Molyneaux, Heather
Publikováno v:
In Journal of Information Security and Applications March 2022 65
Autor:
Buffett, Scott, Spencer, Bruce
Publikováno v:
International Journal of Electronic Commerce, 2004 Jul 01. 8(4), 131-144.
Externí odkaz:
https://www.jstor.org/stable/27751122
Autor:
Buffett, Scott, Spencer, Bruce
Publikováno v:
In Electronic Commerce Research and Applications 2007 6(3):274-284
Autor:
Buffett, Scott
Publikováno v:
Granular Computing; Oct2021, Vol. 6 Issue 4, p853-866, 14p
Publikováno v:
Computational Intelligence. Nov2004, Vol. 20 Issue 4, p663-677. 15p. 2 Diagrams, 2 Charts.
This paper reports on findings resulting from our research conducted for the 2014 Business Process Intelligence (BPI) Challenge. The goal of this year's challenge was to identify predictive patterns in the data, provided by Rabobank's ICT operations
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1674::07cd4c8bb5a1e476dd651d1f4c471c68
https://nrc-publications.canada.ca/eng/view/object/?id=7fcef9b3-83e0-4763-b401-6bbbc2426bc6
https://nrc-publications.canada.ca/eng/view/object/?id=7fcef9b3-83e0-4763-b401-6bbbc2426bc6
Autor:
Emond, Bruno, Buffett, Scott
This paper reports on results of applying process discovery mining and sequence classifcation mining techniques to a data set of semi-structured learning activities. The main research objective is to advance educational data mining to model and suppo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1674::a20506cc2e646e8248ed9d969d1d13cd
https://nrc-publications.canada.ca/eng/view/object/?id=c1eee199-2ec7-4bb2-846f-22e67c370523
https://nrc-publications.canada.ca/eng/view/object/?id=c1eee199-2ec7-4bb2-846f-22e67c370523
Autor:
Buffett, Scott1 (AUTHOR) scott.buffett@nrc.gc.ca
Publikováno v:
Information (2078-2489). Jan2020, Vol. 11 Issue 1, p44-44. 1p.