Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,214 papers from all fields of science
Search
Sign In
Create Free Account
OpenBSM
Known as:
BSM
, Basic Security Module
OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) Audit API and file format. BSM, which is a system used for auditing…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Application programming interface
Comparison of BSD operating systems
Comparison of operating system kernels
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
A flavor kit for BSM models
W. Porod
,
F. Staub
,
A. Vicente
2014
Corpus ID: 56355357
We present a new kit for the study of flavor observables in models beyond the standard model. The setup is based on the public…
Expand
Highly Cited
2014
Highly Cited
2014
$R_K$ and future $b \to s \ell \ell$ BSM opportunities
G. Hiller
,
M. Schmaltz
2014
Corpus ID: 117332097
Flavor changing neutral current $|\Delta B|=|\Delta S|=1$ processes are sensitive to possible new physics at the electroweak…
Expand
Highly Cited
2012
Highly Cited
2012
Pricing Asian Options Under a Hyper-Exponential Jump Diffusion Model
Ning Cai
,
S. Kou
Operational Research
2012
Corpus ID: 1360158
We obtain a closed-form solution for the double-Laplace transform of Asian options under the hyper-exponential jump diffusion…
Expand
Highly Cited
2011
Highly Cited
2011
Twelve massless flavors and three colors below the conformal window
Z. Fodor
,
K. Holland
,
J. Kuti
,
D. Nógrádi
,
C. Schroeder
2011
Corpus ID: 118648086
Highly Cited
2010
Highly Cited
2010
SVD-Based Universal Spatial Domain Image Steganalysis
Gökhan Gül
,
F. Kurugollu
IEEE Transactions on Information Forensics and…
2010
Corpus ID: 2403547
This paper is concerned with the universal (blind) image steganalysis problem and introduces a novel method to detect especially…
Expand
Highly Cited
2009
Highly Cited
2009
A comparative analysis of a fixed thresholding vs. a classification tree approach for operational burn scar detection and mapping
C. Kontoes
,
H. Poilvé
,
G. Florsch
,
I. Keramitsoglou
,
S. Paralikidis
International Journal of Applied Earth…
2009
Corpus ID: 25556193
Review
2008
Review
2008
Overview of the ITER EC upper launcher
M. Henderson
,
R. Heidinger
,
+32 authors
C. Zucca
2008
Corpus ID: 4533219
The ITER electron cyclotron (EC) upper port antenna (or launcher) is nearing completion of the detailed design stage and the…
Expand
Highly Cited
2006
Highly Cited
2006
A mathematical framework of the bridging scale method
Shaoqiang Tang
,
T. Hou
,
Wing Kam Liu
2006
Corpus ID: 2926651
In this paper, we present a mathematical framework of the bridging scale method (BSM), recently proposed by Liu et al. Under…
Expand
Highly Cited
2005
Highly Cited
2005
Aspects on ADM1 Implementation within the BSM2 Framework
C. Rosen
,
U. Jeppsson
2005
Corpus ID: 53574462
The current work of developing a control simulation benchmark goes back to the work carried out within the COST Action 682…
Expand
Highly Cited
2003
Highly Cited
2003
Robust Support Vector Machines for Anomaly Detection in Computer Security
Wenjie Hu
,
Y. Liao
,
V. Vemuri
International Conference on Machine Learning and…
2003
Corpus ID: 18226230
Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE