Sciweavers

526 search results - page 27 / 106
» Increase honeypot security through data analysis
Sort
View
72
Voted
ICCSA
2005
Springer
15 years 3 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
102
Voted
RULEML
2009
Springer
15 years 4 months ago
Exploration of SWRL Rule Bases through Visualization, Paraphrasing, and Categorization of Rules
Rule bases are increasingly being used as repositories of knowledge content on the Semantic Web. As the size and complexity of these rule bases s, developers and end users need met...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
VLDB
2001
ACM
100views Database» more  VLDB 2001»
15 years 1 months ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
GLOBECOM
2008
IEEE
15 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 3 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...