Sciweavers

47 search results - page 2 / 10
» lisa 2004
Sort
View
LISA
2004
13 years 6 months ago
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, E...
IUI
2004
ACM
13 years 10 months ago
Perceptive assistive agents in team spaces
Lisa D. Harper, Abigail S. Gertner, James A. Van G...
LISA
2004
13 years 6 months ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard
LISA
2004
13 years 6 months ago
Making a Game of Network Security
This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
Marc Dougherty
LISA
2004
13 years 6 months ago
Meta Change Queue: Tracking Changes to People, Places, and Things
Managing information flow between different parts of the enterprise information infrastructure can be a daunting task. We have grown too large to send the complete lists around an...
Jon Finke