Sciweavers

205 search results - page 19 / 41
» Foundations for Intrusion Prevention
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 3 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
81
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
14 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
INFOCOM
2012
IEEE
13 years 3 days ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
AIED
2005
Springer
15 years 3 months ago
EarthTutor: A Multi-Layered Approach to ITS Authoring
This paper presents the EarthTutor authoring tool, a multi-layered system designed to remove the technical hurdles preventing teachers from having full control over the structure o...
Kristen Parton, Aaron Bell, Sowmya Ramachandran
ESAW
2008
Springer
14 years 11 months ago
Engineering Self-modeling Systems: Application to Biology
Complexity of today's systems prevents designers from knowing everything about them and makes engineering them a difficult task for which classical engineering approaches are ...
Carole Bernon, Davy Capera, Jean-Pierre Mano