Sciweavers

13180 search results - page 2305 / 2636
» Network Models
Sort
View
AUSFORENSICS
2004
15 years 6 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
157
Voted
ACSW
2006
15 years 6 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
IADIS
2004
15 years 6 months ago
Marketing capability and E-business performance: a case study of a retail bank
This paper addresses the significance of marketing capability for e-business performance in retail banking. A conceptual framework was built on the marketing and strategic managem...
Helena Ahola, Johanna Ahola
121
Voted
IADIS
2004
15 years 6 months ago
Telecollaboration - a case study for performance analysis of voip systems
The evolving nature of complex traffic issues of IP (Internet Protocol)-based Telecollaboration (TC) business system technology requires an intuitive understanding for the partici...
Venkatesh Mahadevan, Zenon Chaczko
BDA
2001
15 years 6 months ago
Querying RDF Descriptions for Community Web Portals
Community Web Portals (e.g., digital libraries, vertical aggregators, infomediaries) have become quite popular nowadays in supporting specific communities of interest on corporate...
Gregory Karvounarakis, Vassilis Christophides, Dim...
« Prev « First page 2305 / 2636 Last » Next »