Sciweavers

877 search results - page 160 / 176
» Intrusion detection systems as evidence
Sort
View
CPHYSICS
2008
87views more  CPHYSICS 2008»
15 years 1 months ago
Simulating black hole white dwarf encounters
The existence of supermassive black holes lurking in the centers of galaxies and of stellar binary systems containing a black hole with a few solar masses has been established bey...
Stephan Rosswog, Enrico Ramirez-Ruiz, W. Raphael H...
VIZSEC
2005
Springer
15 years 7 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
117
Voted
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
15 years 5 months ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch
CCS
2008
ACM
15 years 3 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
INFOCOM
2011
IEEE
14 years 5 months ago
Implications of device diversity for organic localization
—Many indoor localization methods are based on the association of 802.11 wireless RF signals from wireless access points (WAPs) with location labels. An “organic” RF position...
Jun-geun Park, Dorothy Curtis, Seth J. Teller, Jon...