Sciweavers

1186 search results - page 2 / 238
» A New Approach to Secure Logging
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 10 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
CCS
2010
ACM
14 years 10 months ago
Mimimorphism: a new approach to binary code obfuscation
Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Hainin...
GRID
2006
Springer
14 years 10 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
LISA
1998
14 years 11 months ago
A Visual Approach for Monitoring Logs
Analyzing and monitoring logs that portray system, user, and network activity is essential to meet the requirements of high security and optimal resource availability. While most ...
Luc Girardin, Dominique Brodbeck
CISIS
2007
IEEE
14 years 10 months ago
Gridifying IBM's Generic Log Adapter to Speed-Up the Processing of Log Data
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis