Sciweavers

526 search results - page 23 / 106
» Increase honeypot security through data analysis
Sort
View
CSFW
2011
IEEE
13 years 9 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
CCS
2007
ACM
15 years 3 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
74
Voted
AICT
2007
IEEE
122views Communications» more  AICT 2007»
14 years 11 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
JDFP
2008
81views more  JDFP 2008»
14 years 9 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
BMCBI
2010
89views more  BMCBI 2010»
14 years 9 months ago
Enhancing metabolomic data analysis with Progressive Consensus Alignment of NMR Spectra (PCANS)
Background: Nuclear magnetic resonance spectroscopy is one of the primary tools in metabolomics analyses, where it is used to track and quantify changes in metabolite concentratio...
Jennifer M. Staab, Thomas M. O'Connell, Shawn M. G...