Sciweavers

742 search results - page 90 / 149
» Constructing Hierarchical Rule Systems
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 13 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ACSAC
2004
IEEE
13 years 12 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
IEE
2007
120views more  IEE 2007»
13 years 8 months ago
Classification of model transformation techniques used in UML-based Web engineering
Software development techniques are continuously evolving with the goal of solving the main problems that still affect the building and maintenance of software systems: time, cost...
N. Koch
VLDB
2001
ACM
126views Database» more  VLDB 2001»
14 years 8 months ago
Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems
The correctness of the data managed by database systems is vital to any application that utilizes data for business, research, and decision-making purposes. To guard databases agai...
Can Türker, Michael Gertz
DMSN
2006
ACM
14 years 2 months ago
MeT: a real world oriented metadata management system for semantic sensor networks
A semantic sensor network describes the physical world using the metadata obtained from a sensor network. In this paper, we present our design and implementation of MeT, a real wo...
Hideyuki Kawashima, Yutaka Hirota, Satoru Satake, ...