Sciweavers

526 search results - page 24 / 106
» Increase honeypot security through data analysis
Sort
View
76
Voted
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 3 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
AINA
2010
IEEE
15 years 2 months ago
Data Integration at Scale: From Relational Data Integration to Information Ecosystems
Our world is increasingly data-driven. The growth and value of data continue to exceed all predictions. Potential for business opportunity, economic growth, scientific discovery, ...
Michael L. Brodie
ICML
2003
IEEE
15 years 10 months ago
Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution
Feature selection, as a preprocessing step to machine learning, has been effective in reducing dimensionality, removing irrelevant data, increasing learning accuracy, and improvin...
Lei Yu, Huan Liu
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 9 months ago
Simultaneous scalability and security for data-intensive web applications
For Web applications in which the database component is the bottleneck, scalability can be provided by a third-party Database Scalability Service Provider (DSSP) that caches appli...
Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, ...
95
Voted
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 3 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...