Sciweavers

189 search results - page 30 / 38
» Integrating intrusion detection and network management
Sort
View
CAISE
2006
Springer
13 years 11 months ago
A Matchmaking-based Ontology Evolution Methodology
In this paper, we present the H-Change methodology we have specifically conceived for evolving independent ontologies in open networked systems. Furthermore, we describe the change...
Silvana Castano, Alfio Ferrara, Stefano Montanelli
INAP
2001
Springer
13 years 12 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
ICDCSW
2007
IEEE
14 years 1 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
WORM
2004
13 years 8 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...