Sciweavers

2310 search results - page 339 / 462
» Managing System and Active-Content Integrity
Sort
View
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
14 years 1 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
DISCEX
2003
IEEE
14 years 1 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
ICEIS
2002
IEEE
14 years 27 days ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
CMG
2001
13 years 9 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski
DOLAP
2006
ACM
14 years 1 months ago
Towards a logical multidimensional model for spatial data warehousing and OLAP
Decision support systems (DSS) may be enhanced qualitatively if they are able to also deal with spatial dimensions and measures. Regardless the evident importance of using data wa...
Marcus Costa Sampaio, Andre Gomes de Sousa, Cl&aac...