Sciweavers

421 search results - page 75 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
IPPS
2010
IEEE
14 years 6 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICDCS
1999
IEEE
15 years 1 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
GI
2003
Springer
15 years 2 months ago
Ohne Sicherheit kein Vertrauen in E-Business und eingebettete Systeme
Das Fachgebiet Sicherheit hat sich in den vergangenen Jahren aus verschiedenen Disziplinen der Informatik als Querschnittsthema der Angewandten, Praktischen, Theoretischen und Tech...
Isabel Münch, Manfred Reitenspieß
CGA
2005
14 years 9 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...