Sciweavers

7544 search results - page 1430 / 1509
» Network Forensics Analysis
Sort
View
INFOCOM
2007
IEEE
15 years 10 months ago
Gossiping with Multiple Messages
Abstract— This paper investigates the dissemination of multiple pieces of information in large networks where users contact each other in a random uncoordinated manner, and users...
Sujay Sanghavi, Bruce Hajek, Laurent Massouli&eacu...
CMSB
2007
Springer
15 years 10 months ago
A Unifying Framework for Modelling and Analysing Biochemical Pathways Using Petri Nets
We give a description of a Petri net-based framework for modelling and analysing biochemical pathways, which unifies the qualitative, stochastic and continuous paradigms. Each per...
David Gilbert, Monika Heiner, Sebastian Lehrack
128
Voted
RAID
2007
Springer
15 years 10 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
ACSAC
2006
IEEE
15 years 10 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
BIBE
2006
IEEE
139views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
A Computational Inference Framework for analyzing Gene Regulation Pathway using Microarray Data
Microarray experiments produce gene expression data at such a high speed and volume that it is imperative to use highly specialized computational tools for their analyses. One grou...
Dong-Guk Shin, John Bluis, Yoo Ah Kim, Winfried Kr...
« Prev « First page 1430 / 1509 Last » Next »