Sciweavers

1784 search results - page 324 / 357
» A Structural Analysis of Network Delay
Sort
View
144
Voted
RAID
2009
Springer
15 years 10 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
133
Voted
CCS
2005
ACM
15 years 9 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
102
Voted
CCS
2003
ACM
15 years 8 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
99
Voted
ANOR
2007
80views more  ANOR 2007»
15 years 3 months ago
The minimum shift design problem
The min-SHIFT DESIGN problem (MSD) is an important scheduling problem that needs to be solved in many industrial contexts. The issue is to find a minimum number of shifts and the...
Luca Di Gaspero, Johannes Gärtner, Guy Kortsa...
139
Voted
IJSEKE
1998
141views more  IJSEKE 1998»
15 years 3 months ago
REINAS: A Real-Time System for Managing Environmental Data
Managing scientific data is a challenging task, and many of the problems it presents have yet to be adequately solved. The Real-time Environmental Information Network and Analysi...
Eric C. Rosen, Theodore R. Haining, Darrell D. E. ...