Author image not provided
 Scott Weaver

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.00
Citation Count2
Publication count2
Publication years2008-2012
Available for download1
Average downloads per article648.00
Downloads (cumulative)648
Downloads (12 Months)12
Downloads (6 Weeks)2
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


2 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 2 of 2
Sort by:

November 2012 Bioinformatics: Volume 28 Issue 22, November 2012
Publisher: Oxford University Press
Citation Count: 0

Motivation: Current methods in diagnostic microbiology typically focus on the detection of a single genomic locus or protein in a candidate agent. The presence of the entire microbe is then inferred from this isolated result. Problematically, the presence of recombination in microbial genomes would go undetected unless other genomic loci ...

2 published by ACM
March 2008 ACM Transactions on Information and System Security (TISSEC): Volume 11 Issue 3, March 2008
Publisher: ACM
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 12,   Downloads (Overall): 648

Full text available: PDFPDF
Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe on the privacy of ...
Keywords: assurance, malware, network security, Certification

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us