Sciweavers

325 search results - page 26 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
93
Voted
AINA
2008
IEEE
15 years 7 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai
ITCC
2002
IEEE
15 years 5 months ago
The Object Behavior of Java Object-Oriented Database Management Systems
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the p...
Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, ...
122
Voted
EMSOFT
2001
Springer
15 years 5 months ago
Interface Theories for Component-Based Design
Abstract. We classify component-based models of computation into component models and interface models. A component model speci es for each component how the component behaves in a...
Luca de Alfaro, Thomas A. Henzinger
WWW
2006
ACM
16 years 1 months ago
Tables and trees don't mix (very well)
There are principal differences between the relational model and XML's tree model. This causes problems in all cases where information from these two worlds has to be brought...
Erik Wilde
84
Voted
CHI
2004
ACM
16 years 27 days ago
Presiding over accidents: system direction of human action
As human-computer interaction becomes more closely modeled on human-human interaction, new techniques and strategies for human-computer interaction are required. In response to th...
Jeffrey Heer, Nathaniel Good, Ana Ramirez, Marc Da...