Sciweavers

1424 search results - page 44 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
23
Voted
DLS
2010
146views Languages» more  DLS 2010»
13 years 6 months ago
Experiences with an icon-like expression evaluation system
The design of the Icon programming language's expression evaluation system, which can perform limited backtracking, was unique amongst imperative programming languages when c...
Laurence Tratt
ANCS
2007
ACM
14 years 1 days ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
HCI
2007
13 years 9 months ago
Design Tools for User Experience Design
: The purpose of this research was to develop an approach to artifact design based on information technology. To make interactive systems easy to use, many companies utilize a user...
Kazuhiko Yamazaki, Kazuo Furuta
HICSS
2007
IEEE
187views Biometrics» more  HICSS 2007»
14 years 2 months ago
A Service-Oriented Data Integration and Analysis Environment for In Silico Experiments and Bioinformatics Research
In this paper, we present a practical experiment of building a service-oriented system upon current web services technologies and bioinformatics middleware. The system allows scie...
Xiaorong Xiang, Gregory R. Madey, Jeanne Romero-Se...