Sciweavers

361 search results - page 14 / 73
» Toward a Query Language for Network Attack Data
Sort
View
157
Voted
CCS
2011
ACM
14 years 3 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
108
Voted
BTW
2007
Springer
93views Database» more  BTW 2007»
15 years 10 months ago
Towards an Integrated Model for Data, Metadata, and Operations
: Information integration requires manipulating data and metadata in ways that in general go beyond a single existing transformation formalism. As a result, a complete source-to-ta...
Jürgen Göres, Stefan Dessloch
134
Voted
DSN
2004
IEEE
15 years 7 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
121
Voted
SPAA
2006
ACM
15 years 9 months ago
Towards a scalable and robust DHT
The problem of scalable and robust distributed data storage has recently attracted a lot of attention. A common approach in the area of peer-to-peer systems has been to use a dist...
Baruch Awerbuch, Christian Scheideler
145
Voted
CIKM
2009
Springer
15 years 10 months ago
Towards non-directional Xpath evaluation in a RDBMS
XML query languages use directional path expressions to locate data in an XML data collection. They are tightly coupled to the structure of a data collection, and can fail when ev...
Sourav S. Bhowmick, Curtis E. Dyreson, Erwin Leona...