Sciweavers

4397 search results - page 580 / 880
» Relational Algebra Operations
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
TOOLS
1999
IEEE
15 years 8 months ago
Optimizing Object-Oriented Collection Join Queries through Path Traversals
Path traversals have been recognized as one of the strengths of object-oriented query processing as object retrieval can be carried out through pointer navigation. Apart from path...
David Taniar
110
Voted
FSE
1999
Springer
94views Cryptology» more  FSE 1999»
15 years 8 months ago
On the Construction of Variable-Input-Length Ciphers
Whereas a block cipher enciphers messages of some one particular length the blocklength, a variable-input-length cipher takes messages of varying and preferably arbitrary leng...
Mihir Bellare, Phillip Rogaway
VR
1999
IEEE
15 years 8 months ago
Vestibular Cues and Virtual Environments: Choosing the Magnitude of the Vestibular Cue
The design of virtual environments usually concentrates on constructing a realistic visual simulation and ignores the non-visual cues normally associated with moving through an en...
Laurence R. Harris, Michael Jenkin, Daniel C. Ziko...
ACSAC
1998
IEEE
15 years 8 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer