Sciweavers

4511 search results - page 482 / 903
» Observation Based System Security
Sort
View
CCS
2009
ACM
16 years 5 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
SIGMOD
2008
ACM
188views Database» more  SIGMOD 2008»
16 years 5 months ago
HERMES: aggregative LBS via a trajectory DB engine
We present HERMES, a prototype system based on a powerful query language for trajectory databases, which enables the support of aggregative Location-Based Services (LBS). The key ...
Nikos Pelekis, Elias Frentzos, Nikos Giatrakos, Ya...
ICSE
1999
IEEE-ACM
15 years 9 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...
IEEEARES
2006
IEEE
15 years 11 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
134
Voted
ICPP
2006
IEEE
15 years 11 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao