Sciweavers

13 search results - page 2 / 3
» raid 2000
Sort
View
RAID
2000
Springer
13 years 8 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
RAID
2000
Springer
13 years 8 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
RAID
2000
Springer
13 years 8 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
IPPS
2000
IEEE
13 years 9 months ago
Transient Analysis of Dependability/Performability Models by Regenerative Randomization with Laplace Transform Inversion
In this paper we develop a variant of a previously proposed method the regenerative randomization method for the transient analysis of dependability performability models. The va...
Juan A. Carrasco
MSS
2000
IEEE
160views Hardware» more  MSS 2000»
13 years 9 months ago
Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device
Phoenix is a fault-tolerantreal-time network-attachedstorage device (NASD). Like other NASD architectures, Phoenix provides an object-based interface to data stored on network-att...
Ashish Raniwala, Srikant Sharma, Anindya Neogi, Tz...