Sciweavers

526 search results - page 48 / 106
» Increase honeypot security through data analysis
Sort
View
ISI
2003
Springer
15 years 10 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
ISPASS
2007
IEEE
15 years 11 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
KBSE
2006
IEEE
15 years 10 months ago
Effective Generation of Interface Robustness Properties for Static Analysis
A software system interacts with its environment through system interfaces. Robustness of software systems are governed by various temporal properties related to these interfaces,...
Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie
JNW
2008
99views more  JNW 2008»
15 years 4 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
BMCBI
2010
189views more  BMCBI 2010»
15 years 3 months ago
solQTL: a tool for QTL analysis, visualization and linking to genomes at SGN database
Background: A common approach to understanding the genetic basis of complex traits is through identification of associated quantitative trait loci (QTL). Fine mapping QTLs require...
Isaak Y. Tecle, Naama Menda, Robert M. Buels, Esth...