Sciweavers

97 search results - page 18 / 20
» Rapid Prototyping of Intrusion Detection Systems
Sort
View
VIZSEC
2004
Springer
13 years 11 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
FAST
2004
13 years 7 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
ICSE
1998
IEEE-ACM
13 years 10 months ago
An Approach to Large-Scale Collection of Application Usage Data Over the Internet
Empirical evaluation of software systems in actual usage situations is critical in software engineering. Prototyping, beta testing, and usability testing are widely used to refine...
David M. Hilbert, David F. Redmiles
ICC
2009
IEEE
14 years 1 months ago
An Ultra-Wideband Radar System for Through-the-Wall Imaging Using a Mobile Robot
— High-resolution imaging through walls and other materials using microwave signals serves amongst other applications in the rapid detection of human maneuvering, rescue missions...
A. Judson Braga, Camillo Gentile
WPES
2006
ACM
14 years 6 days ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov