Sciweavers

224 search results - page 45 / 45
» Composable Tools For Network Discovery and Security Analysis
Sort
View
NSPW
2006
ACM
13 years 11 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
ICITA
2005
IEEE
13 years 11 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
13 years 11 months ago
Fast and Efficient Log File Compression
Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system se...
Przemyslaw Skibinski, Jakub Swacha