Sciweavers

526 search results - page 21 / 106
» Increase honeypot security through data analysis
Sort
View
IV
2006
IEEE
149views Visualization» more  IV 2006»
15 years 3 months ago
Challenges in Visual Data Analysis
In today’s applications data is produced at unprecedented rates. While the capacity to collect and store new data rapidly grows, the ability to analyze these data volumes increa...
Daniel A. Keim, Florian Mansmann, Jörn Schnei...
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
15 years 3 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...
ISCAPDCS
2001
14 years 11 months ago
Tolerating Transient Faults through an Instruction Reissue Mechanism
In this paper, we propose a fault-tolerant mechanism for microprocessors, which detects transient faults and recovers from them. There are two driving force to investigate fault-t...
Toshinori Sato, Itsujiro Arita
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
15 years 9 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
STORAGESS
2006
ACM
15 years 3 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller