Sciweavers

209 search results - page 7 / 42
» A Focused, Context-Sensitive Approach to Monitoring
Sort
View
SOCIALCOM
2010
13 years 5 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
IMC
2007
ACM
13 years 9 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
14 years 1 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
ICDE
2006
IEEE
225views Database» more  ICDE 2006»
14 years 1 months ago
Continuous Reverse Nearest Neighbor Monitoring
Continuous spatio-temporal queries have recently received increasing attention due to the abundance of location-aware applications. This paper addresses the Continuous Reverse Nea...
Tian Xia, Donghui Zhang
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
14 years 7 months ago
Locating Mapped Resources in Web 2.0
Abstract-- Mapping mashups are emerging Web 2.0 applications in which data objects such as blogs, photos and videos from different sources are combined and marked in a map using AP...
Anthony K. H. Tung, Beng Chin Ooi, Dongxiang Zhang