Search For:

Displaying 1-3 out of 3 total
Achieving Linguistic Provenance via Plagiarism Detection
Found in: 2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By Nwokedi Idika,Harry Phan,Mayank Varia
Issue Date:August 2013
pp. 648-652
To go beyond what current provenance systems can capture for natural language text documents, we propose the Lincoln Laboratory Plagiarism for Provenance System (LLPla Ì) as an approach for capturing linguistic provenance. Linguistic provenance infers the ...
Extending Attack Graph-Based Security Metrics and Aggregating Their Application
Found in: IEEE Transactions on Dependable and Secure Computing
By Nwokedi Idika,Bharat Bhargava
Issue Date:January 2012
pp. 75-85
The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-...
The Probabilistic Provenance Graph
Found in: 2013 IEEE CS Security and Privacy Workshops (SPW2013)
By Nwokedi Idika,Mayank Varia,Harry Phan
Issue Date:May 2013
pp. 34-41
Previous provenance models have assumed that there is complete certainty in the provenance relationships. But what if this assumption does not hold? In this work, emaiwe propose a probabilistic provenance graph (PPG) model to characterize scenarios where p...