Sciweavers

201 search results - page 26 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
ICIW
2009
IEEE
15 years 5 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
GLOBECOM
2010
IEEE
14 years 8 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
KES
2007
Springer
14 years 11 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
PODS
2005
ACM
147views Database» more  PODS 2005»
15 years 11 months ago
Peer data exchange
Abstract. We present a semantics and answer set programs for relational peer data exchange systems. When a peer answers a query, it exchanges data with other peers in order to supp...
Ariel Fuxman, Phokion G. Kolaitis, Renée J....
SIGMOD
2004
ACM
122views Database» more  SIGMOD 2004»
15 years 11 months ago
Adapting to Source Properties in Processing Data Integration Queries
An effective query optimizer finds a query plan that exploits the characteristics of the source data. In data integration, little is known in advance about sources' propertie...
Zachary G. Ives, Alon Y. Halevy, Daniel S. Weld