Sciweavers

452 search results - page 61 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
14 years 9 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
JUCS
2008
112views more  JUCS 2008»
14 years 9 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
ICSE
1998
IEEE-ACM
15 years 1 months ago
An Approach to Large-Scale Collection of Application Usage Data Over the Internet
Empirical evaluation of software systems in actual usage situations is critical in software engineering. Prototyping, beta testing, and usability testing are widely used to refine...
David M. Hilbert, David F. Redmiles
WWW
2008
ACM
15 years 10 months ago
Improving web spam detection with re-extracted features
Web spam detection has become one of the top challenges for the Internet search industry. Instead of using some heuristic rules, we propose a feature re-extraction strategy to opt...
Guanggang Geng, Chunheng Wang, Qiudan Li
ACSAC
2002
IEEE
15 years 2 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell