Sciweavers

956 search results - page 157 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
CCS
2010
ACM
14 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ICICS
2007
Springer
15 years 3 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
SIGCOMM
2010
ACM
14 years 10 months ago
California fault lines: understanding the causes and impact of network failures
Of the major factors affecting end-to-end service availability, network component failure is perhaps the least well understood. How often do failures occur, how long do they last,...
Daniel Turner, Kirill Levchenko, Alex C. Snoeren, ...
ASPLOS
1998
ACM
15 years 2 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
BMCBI
2008
163views more  BMCBI 2008»
14 years 9 months ago
i-SEGOPubmed: a web interface for semantic enabled browsing of PubMed using Gene Ontology
imately 20 million abstracts. Browsing such a huge repository to find relevant information as well as providing elearning service requires new generation of interfaces. Methods suc...
Mohammed Yeasin, Bhanu Vanteru, Jahangheer S. Shai...