Sciweavers

1737 search results - page 165 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CHI
2008
ACM
16 years 5 months ago
Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis
Although both statistical methods and visualizations have been used by network analysts, exploratory data analysis remains a challenge. We propose that a tight integration of thes...
Adam Perer, Ben Shneiderman
142
Voted
EDOC
2000
IEEE
15 years 9 months ago
Ponder: Realising Enterprise Viewpoint Concepts
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
ROBOCUP
2001
Springer
138views Robotics» more  ROBOCUP 2001»
15 years 9 months ago
Interpretation of Spatio-temporal Relations in Real-Time and Dynamic Environments
With the more sophisticated abilities of teams within the simulation league high level online functions become more and more attractive. Last year we proposed an approach to recogn...
Andrea Miene, Ubbo Visser
CCS
2006
ACM
15 years 8 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 5 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...