Sciweavers

311 search results - page 36 / 63
» Criticality analysis of Internet infrastructure
Sort
View
AFRIGRAPH
2004
ACM
15 years 5 months ago
The visualisation of application delay metrics for a customer network
– Application services are fundamental network components that allow organizations the ability to operate efficiently. It has become essential for organizations to monitor the pe...
Janet Wesson, Darelle van Greunen, Justin Rademan
140
Voted
CASES
2005
ACM
15 years 2 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
115
Voted
VIIP
2001
15 years 1 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
84
Voted
ESWS
2009
Springer
15 years 7 months ago
Representing, Querying and Transforming Social Networks with RDF/SPARQL
As social networks are becoming ubiquitous on the Web, the Semantic Web goals indicate that it is critical to have a standard model allowing exchange, interoperability, transformat...
Mauro San Martín, Claudio Gutierrez
89
Voted
EPEW
2005
Springer
15 years 6 months ago
Life After BPEL?
The Business Process Execution Language for Web Services (BPEL) has emerged as a standard for specifying and executing processes. It is supported by vendors such as IBM and Microso...
Wil M. P. van der Aalst, Marlon Dumas, Arthur H. M...