Sciweavers

325 search results - page 26 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
AINA
2008
IEEE
14 years 2 months ago
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System
In this paper we proposed a weighted suffix tree and find out it can improve the Intrusion Detection System (IDS). We firstly focus on the analysis of computer kernel system call,...
Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai
ITCC
2002
IEEE
14 years 16 days ago
The Object Behavior of Java Object-Oriented Database Management Systems
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the p...
Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, ...
EMSOFT
2001
Springer
14 years 4 days ago
Interface Theories for Component-Based Design
Abstract. We classify component-based models of computation into component models and interface models. A component model speci es for each component how the component behaves in a...
Luca de Alfaro, Thomas A. Henzinger
WWW
2006
ACM
14 years 8 months ago
Tables and trees don't mix (very well)
There are principal differences between the relational model and XML's tree model. This causes problems in all cases where information from these two worlds has to be brought...
Erik Wilde
CHI
2004
ACM
14 years 8 months ago
Presiding over accidents: system direction of human action
As human-computer interaction becomes more closely modeled on human-human interaction, new techniques and strategies for human-computer interaction are required. In response to th...
Jeffrey Heer, Nathaniel Good, Ana Ramirez, Marc Da...