Sciweavers

267 search results - page 54 / 54
» OWL and Qualitative Reasoning Models
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
SIGMETRICS
2003
ACM
119views Hardware» more  SIGMETRICS 2003»
13 years 10 months ago
Incrementally improving lookup latency in distributed hash table systems
Distributed hash table (DHT) systems are an important class of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will ...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan