Sciweavers

438 search results - page 26 / 88
» Defending Critical Infrastructure
Sort
View
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 3 months ago
Preprocessing DNS Log Data for Effective Data Mining
—The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
ACSAC
2006
IEEE
14 years 2 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
13 years 10 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
BPSC
2009
200views Business» more  BPSC 2009»
13 years 10 months ago
A Semantic Framework for Compliance Management in Business Process Management
: In process-centric enterprises, business processes (BPs) are at the center of value-creating activities. Governing enterprise BPs requires the ability to control and guide BP beh...
Marwane El Kharbili, Elke Pulvermüller
COGSCI
2007
138views more  COGSCI 2007»
13 years 8 months ago
The Brain Is Both Neurocomputer and Quantum Computer
In their article, Is the Brain a Quantum Computer,? Litt, Eliasmith, Kroon, Weinstein, and Thagard (2006) criticize the Penrose–Hameroff “Orch OR” quantum computational mode...
Stuart R. Hameroff