Sciweavers

294 search results - page 17 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
IADIS
2004
13 years 10 months ago
A distributed monitoring system with global network and Web technology
A distributed monitoring system has been developed, which is organized with network cameras, an integrated web/mail server, web-based clients including high-performance cellular p...
Yoshiro Imai, Daisuke Yamane, Osamu Sadayuki
VIZSEC
2005
Springer
14 years 2 months ago
Visual Correlation of Host Processes and Network Traffic
Anomalous communication patterns are one of the leading indicators of computer system intrusions according to the system administrators we have interviewed. But a major problem is...
Glenn A. Fink, Paul Muessig, Chris North
FM
2009
Springer
104views Formal Methods» more  FM 2009»
14 years 3 months ago
Verifying Information Flow Control over Unbounded Processes
Abstract. Decentralized Information Flow Control (DIFC) systems enable programmers to express a desired DIFC policy, and to have the policy enforced via a reference monitor that re...
William R. Harris, Nicholas Kidd, Sagar Chaki, Som...
EMSOFT
2005
Springer
14 years 2 months ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan
SAC
2011
ACM
12 years 11 months ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez