Sciweavers

Share
295 search results - page 59 / 59
» The Internet Enterprise
Sort
View
CCS
2007
ACM
9 years 3 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
DSN
2004
IEEE
9 years 3 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
9 years 1 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
DGO
2003
133views Education» more  DGO 2003»
9 years 21 days ago
Accessing Diverse Geo-Referenced Data Sources with the SAND Spatial DBMS
The Internet has become the most frequently accessed medium for obtaining various types of data. In particular, government agencies, academic institutions, and private enterprises...
Jagan Sankaranarayanan, Egemen Tanin, Hanan Samet,...
JTAER
2008
82views more  JTAER 2008»
8 years 11 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
books