Sciweavers

21 search results - page 4 / 5
» Visualizing Enterprise-Wide Security (VIEWS)
Sort
View
IEEEARES
2010
IEEE
13 years 11 months ago
Visualizing Past Personal Data Disclosures
—Today’s rich service offer in the World Wide Web increasingly requires the disclosure of personal user data. Service providers’ appetite for personal user data, however, is ...
Jan Kolter, Michael Netter, Günther Pernul
OSDI
2008
ACM
14 years 6 months ago
SALSA: Analyzing Logs as StAte Machines
SALSA examines system logs to derive state-machine views of the sytem's execution, along with control-flow, data-flow models and related statistics. Exploiting SALSA's d...
Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gand...
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 17 days ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
13 years 11 months ago
Displaying Aggregate Data, Interrelated Quantities, and Data Trends in Electric Power Systems
This paper describes a number of effective techniques for visualizing some of the more complex data relationships that characterize an electric power system in real time. Power sy...
Ray Klump, Warren Wu, Greg Dooley
MM
2010
ACM
252views Multimedia» more  MM 2010»
13 years 6 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...