This chapter discusses an extended deductive database prototype system, Q-Data, developed by Bellcore to improve data quality through data validation and cleanup. The key technolo...
Network intruders try to hide their identity by relaying their traf c through a number of intermediate hosts, called stepping stones. Network ow watermarks have been used to detec...
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
— Electronic health records (EHR) promise to improve communication between health care providers, thus leading to better quality of patients’ treatment and reduced costs. As hi...
Bernhard Riedl, Veronika Grascher, Stefan Fenz, Th...
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...