Sciweavers

519 search results - page 38 / 104
» Enhancing information systems security in an academic organi...
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
Honeypots: Catching the Insider Threat
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
Lance Spitzner
GROUP
2010
ACM
13 years 6 months ago
Enhancing group recommendation by incorporating social relationship interactions
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social acti...
Mike Gartrell, Xinyu Xing, Qin Lv, Aaron Beach, Ri...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 5 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
ICC
2009
IEEE
100views Communications» more  ICC 2009»
14 years 2 months ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
STORAGESS
2005
ACM
14 years 1 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...