Sciweavers

8 search results - page 1 / 2
» Intrusion activity projection for cyber situational awarenes...
Sort
View
ISI
2008
Springer
13 years 4 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
ICCS
2007
Springer
13 years 10 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
13 years 11 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
CII
2007
73views more  CII 2007»
13 years 4 months ago
Competency characterisation by means of work situation modelling
Nowadays companies have to face the rapid evolution of their competitive environment. In the field of design, project managers are aware of both the impact of the designers’ com...
Farouk Belkadi, Eric Bonjour, Maryvonne Dulmet
CSCW
2002
ACM
13 years 4 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...