Sciweavers

1356 search results - page 38 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
VIZSEC
2004
Springer
14 years 1 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
14 years 2 months ago
Coordination Network Analysis: A Research Framework for Studying the Organizational Impacts of Service-Orientation in Business I
Business intelligence (BI) technology and research is maturing. In evidence, some practitioners have indicated a shift in the nature of their data warehousing challenges from bein...
Mark Keith, Haluk Demirkan, Michael Goul
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 8 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
CCS
2003
ACM
14 years 1 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
EUROPAR
2005
Springer
14 years 2 months ago
Faults in Large Distributed Systems and What We Can Do About Them
Scientists are increasingly using large distributed systems built from commodity off-the-shelf components to perform scientific computation. Grid computing has expanded the scale ...
George Kola, Tevfik Kosar, Miron Livny