Sciweavers

1486 search results - page 37 / 298
» Firewall Rules Analysis
Sort
View
FASE
2008
Springer
15 years 1 months ago
Translating Model Simulators to Analysis Models
We present a novel approach for the automatic generation of model-to-model transformations given a description of the operational semantics of the source language by means of graph...
Juan de Lara, Hans Vangheluwe
ECML
1993
Springer
15 years 3 months ago
SIA: A Supervised Inductive Algorithm with Genetic Search for Learning Attributes based Concepts
This paper describes a genetic learning system called SIA, which learns attributes based rules from a set of preclassified examples. Examples may be described with a variable numbe...
Gilles Venturini

Lecture Notes
404views
16 years 10 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
STOC
2003
ACM
193views Algorithms» more  STOC 2003»
16 years 3 days ago
Space efficient dynamic stabbing with fast queries
In dynamic stabbing, we operate on a dynamic set of intervals. A stabbing query asks for an interval containing a given point. This basic problem encodes problems such as method l...
Mikkel Thorup
AINA
2008
IEEE
15 years 6 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar