Sciweavers

15 search results - page 2 / 3
» Generating Policies for Defense in Depth
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 8 days ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
RSA
2000
170views more  RSA 2000»
13 years 6 months ago
Delayed path coupling and generating random permutations
We analyze various stochastic processes for generating permutations almost uniformly at random in distributed and parallel systems. All our protocols are simple, elegant and are b...
Artur Czumaj, Miroslaw Kutylowski
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 3 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
CN
1999
93views more  CN 1999»
13 years 6 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
VLDB
2001
ACM
139views Database» more  VLDB 2001»
13 years 10 months ago
NetCube: A Scalable Tool for Fast Data Mining and Compression
We propose an novel method of computing and storing DataCubes. Our idea is to use Bayesian Networks, which can generate approximate counts for any query combination of attribute v...
Dimitris Margaritis, Christos Faloutsos, Sebastian...