Sciweavers

526 search results - page 16 / 106
» Increase honeypot security through data analysis
Sort
View
MIR
2004
ACM
92views Multimedia» more  MIR 2004»
15 years 2 months ago
Researchexplorer: gaining insights through exploration in multimedia scientific data
An increasing amount of heterogeneous information about scientific research is becoming available on-line. This potentially allows users to explore the information from multiple p...
Bo Gong, Rahul Singh, Ramesh Jain
SIGMOD
2005
ACM
150views Database» more  SIGMOD 2005»
15 years 9 months ago
BRAID: Stream Mining through Group Lag Correlations
The goal is to monitor multiple numerical streams, and determine which pairs are correlated with lags, as well as the value of each such lag. Lag correlations (and anticorrelation...
Yasushi Sakurai, Spiros Papadimitriou, Christos Fa...
DSN
2003
IEEE
15 years 2 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
96
Voted
VRML
1998
ACM
15 years 1 months ago
Visualization Products On-Demand Through the Web
We describe our efforts in providing REINAS (Realtime Environmental Information Network and Analysis System) weather visualization products on demand through the web. As the REINA...
Suzana Djurcilov, Alex Pang
ISW
2010
Springer
14 years 7 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...