Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Studies of worm outbreaks have found that the speed of worm propagation makes manual intervention ineffective. Consequently, many automated containment mechanisms have been propos...
In a component-based software system the components are specified, designed and implemented with the intention to be reused, and are assembled in various contexts in order to pro...
Antonio Bucchiarone, Andrea Polini, Patrizio Pelli...
This paper argues that the network latency due to synchronous replication is no longer tolerable in scenarios where businesses are required by regulation to separate their seconda...
Xiaotao Liu, Gal Niv, Prashant J. Shenoy, K. K. Ra...
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...