Sciweavers

24 search results - page 2 / 5
» raid 1999
Sort
View
RAID
1999
Springer
13 years 9 months ago
Misuse Detection in Database Systems Through User Profiling
Christina Yip Chung, Michael Gertz, Karl N. Levitt
RAID
2000
Springer
13 years 9 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
RAID
1999
Springer
13 years 9 months ago
Results of the DARPA 1998 Offline Intrusion Detection Evaluation
Richard Lippmann, Robert K. Cunningham, David J. F...
RAID
1999
Springer
13 years 9 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
PRDC
1999
IEEE
13 years 9 months ago
FBD: A Fault-tolerant Buffering Disk System for Improving Write Performance of RAID5 Systems
The parity calculation technique of the RAID5 provides high reliability, efficient disk space usage, and good read performance for parallel-disk-array configurations. However, it ...
Haruo Yokota, Masanori Goto