Sciweavers

294 search results - page 27 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
RAID
2001
Springer
14 years 2 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
PASTE
2005
ACM
14 years 3 months ago
MonDe: safe updating through monitored deployment of new component versions
Safely updating software at remote sites is a cautious balance of enabling new functionality and avoiding adverse effects on existing functionality. A useful first step in this p...
Jonathan E. Cook, Alessandro Orso
IM
2003
13 years 11 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
RAID
1999
Springer
14 years 2 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
BPM
2009
Springer
142views Business» more  BPM 2009»
14 years 4 months ago
Flexible Multi-dimensional Visualization of Process Enactment Data
The management of development processes is a challenging task and needs adequate tool support. In the course of a development project, many different engineering and management pr...
Thomas Heer, Christoph Außem, René W&...