Sciweavers

1268 search results - page 231 / 254
» Dynamic Tool Integration in Heterogeneous Computer Networks
Sort
View
111
Voted
DSOM
2003
Springer
15 years 7 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
NN
2008
Springer
169views Neural Networks» more  NN 2008»
15 years 1 months ago
Modeling a flexible representation machinery of human concept learning
dely acknowledged that categorically organized abstract knowledge plays a significant role in high-order human cognition. Yet, there are many unknown issues about the nature of ho...
Toshihiko Matsuka, Yasuaki Sakamoto, Arieta Chouch...
WORDS
2005
IEEE
15 years 7 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
123
Voted
GI
2009
Springer
14 years 11 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
113
Voted
CCS
2004
ACM
15 years 7 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...