Sciweavers

451 search results - page 33 / 91
» Identifying Facts for TCBR
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
Tye Stallard, Karl N. Levitt
IAW
2003
IEEE
15 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
CSIE
2009
IEEE
15 years 2 months ago
Scenario-Based Traffic Modeling for Data Emanating from Medical Instruments in Clinical Environment
In this paper, the application of individual scenario-based traffic models in identifying the traffic carrying needs of networks in patient monitoring environments is presented. S...
Aftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Y...
ICLP
2007
Springer
15 years 1 months ago
OnEQL: An Ontology Efficient Query Language Engine for the Semantic Web
Abstract. In this paper we describe the OnEQL system, a query engine that implements optimization techniques and evaluation strategies to speed up the evaluation time of querying a...
Edna Ruckhaus, Maria-Esther Vidal, Eduardo Ruiz
76
Voted
AMAST
2006
Springer
15 years 1 months ago
State Space Reduction of Rewrite Theories Using Invisible Transitions
Abstract. State space explosion is the hardest challenge to the effective application of model checking methods. We present a new technique for achieving drastic state space reduct...
Azadeh Farzan, José Meseguer