Sciweavers

282 search results - page 16 / 57
» Improved Thumbprint and Its Application for Intrusion Detect...
Sort
View
WSE
2006
IEEE
15 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
90
Voted
RAID
1999
Springer
15 years 1 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
91
Voted
WWW
2010
ACM
15 years 4 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
AINA
2010
IEEE
15 years 2 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
68
Voted
HUC
2005
Springer
15 years 3 months ago
Place-Its: A Study of Location-Based Reminders on Mobile Phones
Abstract. Context-awareness can improve the usefulness of automated reminders. However, context-aware reminder applications have yet to be evaluated throughout a person’s daily l...
Timothy Sohn, Kevin A. Li, Gunny Lee, Ian E. Smith...