Sciweavers

374 search results - page 37 / 75
» Deployment automation with BLITZ
Sort
View
SEW
2005
IEEE
14 years 2 months ago
Bridging the Gap between Systems Design
A challenging problem for software engineering practitioners is moving from high-level system architectures produced by system engineers to deployable software produced by softwar...
David Garlan, William K. Reinholtz, Bradley R. Sch...
ISPEC
2005
Springer
14 years 2 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
POLICY
2005
Springer
14 years 2 months ago
Adding Policy-Based Control to Mobile Hosts Switching between Streaming Proxies
We add a simple policy-based control component to mobile hosts that enables them to control the continuous reception of live multimedia content (e.g. a TV broadcast) while they sw...
Malohat Ibrohimovna Kamilova, Cristian Hesselman, ...
CEAS
2004
Springer
14 years 2 months ago
Stopping Spam by Extrusion Detection
End users are often unaware that their systems have been compromised and are being used to send bulk unsolicited email (spam). We show how automated processing of the email logs re...
Richard Clayton
EWCBR
2004
Springer
14 years 2 months ago
An Analysis of Case-Base Editing in a Spam Filtering System
Because of the volume of spam email and its evolving nature, any deployed Machine Learning-based spam filtering system will need to have procedures for case-base maintenance. Key t...
Sarah Jane Delany, Padraig Cunningham