Sciweavers

52 search results - page 5 / 11
» Application-Integrated Data Collection for Security Monitori...
Sort
View
DSN
2005
IEEE
15 years 3 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 1 days ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
TELECARE
2004
184views Healthcare» more  TELECARE 2004»
14 years 11 months ago
Securing Mobile Agent Based Tele-Assistance Systems
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives...
Sergio Pozo, Rafael M. Gasca, María Teresa ...
GRID
2006
Springer
14 years 9 months ago
Snapshot Processing in Streaming Environments
Monitoring and correlation of streaming data from multiple sources is becoming increasingly important in many application areas. Example applications include automated commodities...
Daniel M. Zimmerman, K. Mani Chandy
WISEC
2010
ACM
15 years 2 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...