The design of the Icon programming language's expression evaluation system, which can perform limited backtracking, was unique amongst imperative programming languages when c...
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
: The purpose of this research was to develop an approach to artifact design based on information technology. To make interactive systems easy to use, many companies utilize a user...
In this paper, we present a practical experiment of building a service-oriented system upon current web services technologies and bioinformatics middleware. The system allows scie...
Xiaorong Xiang, Gregory R. Madey, Jeanne Romero-Se...