Sciweavers

11716 search results - page 2267 / 2344
» Computable symbolic dynamics
Sort
View
PREMI
2007
Springer
14 years 3 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron
RAID
2007
Springer
14 years 3 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
WISTP
2007
Springer
14 years 3 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
ACSAC
2006
IEEE
14 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
AGILEDC
2006
IEEE
14 years 3 months ago
Using an Agile Approach in a Large, Traditional Organization
Can Agile approaches be used successfully in large organizations, where traditional methods and high levels of governance are the norm? Although the iterative, agile approaches ha...
Dot Tudor, George A. Walter
« Prev « First page 2267 / 2344 Last » Next »