Sciweavers

2272 search results - page 261 / 455
» Provable Data Privacy
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
EUROSEC
2010
ACM
15 years 9 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...
AGENTS
2001
Springer
15 years 8 months ago
A multi-agent system for automated genomic annotation
Massive amounts of raw data are currently being generated by biologists while sequencing organisms. Outside of the largest, high-pro le projects such as the Human Genome Project, ...
Keith Decker, Xiaojing Zheng, Carl Schmidt
ECIS
2003
15 years 5 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther