Sciweavers

1568 search results - page 308 / 314
» Requirements and Services for Metadata Management
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
SIGUCCS
1999
ACM
15 years 1 months ago
Bridging Worlds: The IT Support Professional as Interpreter Between Cultures
One result of the action of Moore’s Law, the doubling of IT (Information Technology) power every 18 months, is a widening gap in the understanding of this technology between tho...
Don Rea
HPDC
1999
IEEE
15 years 1 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
SIGUCCS
1998
ACM
15 years 1 months ago
IT Training for Students, Who Needs It?
This presentation will be a discussion of two Information Technology training programs at the university/college level. The two programs are ”The Student Peer Trainers”(SPT) a...
Penny Haselwander
ACSAC
2009
IEEE
15 years 1 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...