CS Store Search
Displaying 1-3 out of 3 total
Achieving Linguistic Provenance via Plagiarism Detection
2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By Nwokedi Idika,Harry Phan,Mayank Varia
Issue Date:August 2013
To go beyond what current provenance systems can capture for natural language text documents, we propose the Lincoln Laboratory Plagiarism for Provenance System (LLPla Ì) as an approach for capturing linguistic provenance. Linguistic provenance infers the ...
Extending Attack Graph-Based Security Metrics and Aggregating Their Application
IEEE Transactions on Dependable and Secure Computing
By Nwokedi Idika,Bharat Bhargava
Issue Date:January 2012
The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-...
The Probabilistic Provenance Graph
2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Nwokedi Idika,Mayank Varia,Harry Phan
Issue Date:May 2013
Previous provenance models have assumed that there is complete certainty in the provenance relationships. But what if this assumption does not hold? In this work, emaiwe propose a probabilistic provenance graph (PPG) model to characterize scenarios where p...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.