Sciweavers

526 search results - page 38 / 106
» Increase honeypot security through data analysis
Sort
View
VIZSEC
2005
Springer
15 years 10 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
138
Voted
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 7 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
134
Voted
COMPUTER
1999
108views more  COMPUTER 1999»
15 years 4 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
ESORICS
2009
Springer
16 years 5 months ago
Authentic Time-Stamps for Archival Storage
Abstract. We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g.,...
Alina Oprea, Kevin D. Bowers
IDA
2007
Springer
15 years 10 months ago
Visualising the Cluster Structure of Data Streams
The increasing availability of streaming data is a consequence of the continuing advancement of data acquisition technology. Such data provides new challenges to the various data a...
Dimitris K. Tasoulis, Gordon J. Ross, Niall M. Ada...