Sciweavers

653 search results - page 3 / 131
» The stepping stones project
Sort
View
AINA
2009
IEEE
15 years 4 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
60
Voted
SOFSEM
1997
Springer
15 years 3 months ago
Stepping Stones to an Information Society
Jirí Zlatuska
AINA
2008
IEEE
15 years 1 months ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang
51
Voted
EUNIS
2001
15 years 1 months ago
Paris Academic Network Project / High speed metropolitan area network for research and educational
Stoned Elipot, Jean-Paul Gautier, Jean-Claude Gira...
WABI
2007
Springer
109views Bioinformatics» more  WABI 2007»
15 years 5 months ago
Two Birds, One Stone: Selecting Functionally Informative Tag SNPs for Disease Association Studies
Selecting an informative subset of SNPs, generally referred to as tag SNPs, to genotype and analyze is considered to be an essential step toward effective disease association studi...
Phil Hyoun Lee, Hagit Shatkay