Sciweavers

2236 search results - page 122 / 448
» Intrusion detection techniques and approaches
Sort
View
ISVC
2007
Springer
15 years 4 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
SISW
2003
IEEE
15 years 3 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 11 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
COOPIS
2004
IEEE
15 years 1 months ago
Refresco: Improving Query Performance Through Freshness Control in a Database Cluster
Abstract. We consider the use of a cluster system for managing autonomous databases. In order to improve the performance of read-only queries, we strive to exploit user requirement...
Cécile Le Pape, Stéphane Ganç...
ACSAC
2005
IEEE
15 years 3 months ago
Building Evidence Graphs for Network Forensics Analysis
In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the...
Wei Wang, Thomas E. Daniels