Sciweavers

325 search results - page 17 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
DASC
2006
IEEE
14 years 1 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
IPPS
1999
IEEE
13 years 12 months ago
Design and Implementation of a Scalable Parallel System for Multidimensional Analysis and OLAP
Multidimensional Analysis and On-Line Analytical Processing (OLAP) uses summary information that requires aggregate operations along one or more dimensions of numerical data value...
Sanjay Goil, Alok N. Choudhary
TES
2000
Springer
13 years 11 months ago
Web Services and Information Delivery for Diverse Environments
There is a growing need for techniques that provide alternative means to access Web content and services, be it the ability to browse the Web through a voice interface like the Ph...
Juliana Freire, Bharat Kumar
ICPP
2008
IEEE
14 years 2 months ago
Machine Learning Models to Predict Performance of Computer System Design Alternatives
Computer manufacturers spend a huge amount of time, resources, and money in designing new systems and newer configurations, and their ability to reduce costs, charge competitive p...
Berkin Özisikyilmaz, Gokhan Memik, Alok N. Ch...
ITCC
2005
IEEE
14 years 1 months ago
VisDP: A Web Service for Visualizing Design Patterns on Demand
Design patterns document good design solutions to a recurring problem in a particular context. They are typically modeled using UML. In practice, however, pattern-related informat...
Jing Dong, Sheng Yang, Kang Zhang