Sciweavers

1186 search results - page 18 / 238
» A New Approach to Secure Logging
Sort
View
IJNSEC
2010
112views more  IJNSEC 2010»
13 years 3 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
CSREASAM
2010
13 years 6 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
MICCAI
2010
Springer
13 years 6 months ago
Probabilistic Multi-Shape Representation Using an Isometric Log-Ratio Mapping
Abstract. Several sources of uncertainties in shape boundaries in medical images have motivated the use of probabilistic labeling approaches. Although it is well-known that the sam...
Neda Changizi, Ghassan Hamarneh
ICDE
2009
IEEE
120views Database» more  ICDE 2009»
14 years 3 months ago
Recommending Join Queries via Query Log Analysis
— Complex ad hoc join queries over enterprise databases are commonly used by business data analysts to understand and analyze a variety of enterprise-wide processes. However, eff...
Xiaoyan Yang, Cecilia M. Procopiuc, Divesh Srivast...
IADIS
2003
13 years 9 months ago
A New Key Distribution Scheme for Secure Multicast Communications
In this short paper, we propose a new key management architecture for Multicast communications. This architecture combines the complementary variable approach with hashed keys and...
Martin St-Amand, Boucif Amar Bansaber, Dominique S...