Sciweavers

4052 search results - page 116 / 811
» Using RDF to describe networks
Sort
View
VIZSEC
2007
Springer
15 years 7 months ago
Visual Analysis of Network Flow Data with Timelines and Event Plots
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...
124
Voted
MSS
2000
IEEE
130views Hardware» more  MSS 2000»
15 years 4 months ago
Design for a Decentralized Security System For Network Attached Storage
T This paper describes an architecture for a secure file system based on network-attached storage that guarantees end-to-end encryption for all user data. We describe the design of...
William E. Freeman, Ethan L. Miller
88
Voted
ENTCS
2002
125views more  ENTCS 2002»
15 years 18 days ago
Pathway Logic: Executable Models of Biological Networks
In this paper we describe the use of the rewriting logic based Maude tool to model and analyze mammalian signaling pathways. We discuss the representation of the underlying biolog...
Steven Eker, Merrill Knapp, Keith Laderoute, Patri...
101
Voted
TRIDENTCOM
2010
IEEE
14 years 10 months ago
How to Build Complex, Large-Scale Emulated Networks
Abstract. This paper describes AutoNetkit, an auto-configuration tool for complex network emulations using Netkit, allowing large-scale networks to be tested on commodity hardware....
Hung X. Nguyen, Matthew Roughan, Simon Knight, Nic...
RAID
2004
Springer
15 years 6 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...