Sciweavers

341 search results - page 60 / 69
» A Security Engineering Process based on Patterns
Sort
View
125
Voted
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 3 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
93
Voted
ER
2007
Springer
129views Database» more  ER 2007»
15 years 5 months ago
A Methodology and Toolkit for Deploying Contract Documents as E-contracts
Recent research in e-contracts is concerned with the development of frameworks and tools to support contracts. EREC framework is one that enables modelling and deployment of e-con...
Anushree Khandekar, P. Radha Krishna, Kamalakar Ka...
BTW
2003
Springer
103views Database» more  BTW 2003»
15 years 4 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
KDD
2006
ACM
198views Data Mining» more  KDD 2006»
16 years 1 days ago
Event detection from evolution of click-through data
Previous efforts on event detection from the web have focused primarily on web content and structure data ignoring the rich collection of web log data. In this paper, we propose t...
Qiankun Zhao, Tie-Yan Liu, Sourav S. Bhowmick, Wei...
92
Voted
PTS
2007
120views Hardware» more  PTS 2007»
15 years 1 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König