Sciweavers

14 search results - page 2 / 3
» Visualizing and Identifying Intrusion Context from System Ca...
Sort
View
AADEBUG
1997
Springer
13 years 9 months ago
Modeling Intelligent System Execution as State Transition Diagrams to Support Debugging
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Adele E. Howe, Gabriel Somlo
NDSS
2008
IEEE
13 years 11 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
TVCG
2008
118views more  TVCG 2008»
13 years 5 months ago
Visual Perception and Mixed-Initiative Interaction for Assisted Visualization Design
This paper describes the integration of perceptual guidelines from human vision with an AI-based mixed-initiative search strategy. The result is a visualization assistant called Vi...
Christopher G. Healey, Sarat Kocherlakota, Vivek R...
CN
2004
256views more  CN 2004»
13 years 5 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
LISA
2008
13 years 7 months ago
ENAVis: Enterprise Network Activities Visualization
Abstract-- With the prevalence of multi-user environments, it has become an increasingly challenging task to precisely identify who is doing what on an enterprise network. Current ...
Qi Liao, Andrew Blaich, Aaron Striegel, Douglas Th...