Sciweavers

1122 search results - page 76 / 225
» Information Retrieval in Network Administration
Sort
View
ICC
2007
IEEE
173views Communications» more  ICC 2007»
15 years 5 months ago
A Dynamic Stateful Multicast Firewall
—Enterprises are faced with the challenge of enabling IP multicast applications without exposing their network to multicast denial-of-service attacks. Current practice is to use ...
Shen Li, Vijay Sivaraman, Alex Krumm-Heller, Craig...
IWIA
2005
IEEE
15 years 4 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
IADIS
2003
15 years 18 days ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
CIKM
2004
Springer
15 years 4 months ago
SWAM: a family of access methods for similarity-search in peer-to-peer data networks
Peer-to-peer Data Networks (PDNs) are large-scale, selforganizing, distributed query processing systems. Familiar examples of PDN are peer-to-peer file-sharing networks, which su...
Farnoush Banaei Kashani, Cyrus Shahabi
CONTEXT
2007
Springer
15 years 3 months ago
A Personalized Retrieval Model based on Influence Diagrams
Abstract. A key challenge in information retrieval is the use of contextual evidence within ad-hoc retrieval. Our contribution is particularly based on the belief that contextual r...
Nesrine Zemirli, Lynda Tamine, Mohand Boughanem