Sciweavers

450 search results - page 28 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
ICDCSW
2008
IEEE
15 years 4 months ago
Secure Control: Towards Survivable Cyber-Physical Systems
In this position paper we investigate the security of cyberphysical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that informati...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
RAID
1999
Springer
15 years 2 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
PVLDB
2010
111views more  PVLDB 2010»
14 years 4 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...
FPL
2009
Springer
105views Hardware» more  FPL 2009»
15 years 1 months ago
Run-time resource management in fault-tolerant network on reconfigurable chips
This paper investigates the challenges of run-time resource management in future coarse-grained network-onreconfigurable-chips (NoRCs). Run-time reconfiguration is a key feature e...
Mohammad Hosseinabady, José L. Nú&nt...
IPPS
2010
IEEE
14 years 7 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...