Sciweavers

80 search results - page 13 / 16
» Managing intrusion detection rule sets
Sort
View
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 1 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
IAW
2003
IEEE
14 years 1 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
CIKM
2008
Springer
13 years 9 months ago
Automatic detection of treatment relationships for patent retrieval
We devise a method for automatically detecting treatment relationships using lexico-syntactic patterns and its application to medical-oriented patent retrieval. This process for d...
Aaron Chu, Shigeyuki Sakurai, Alfonso F. Cardenas
BPM
2011
Springer
295views Business» more  BPM 2011»
12 years 7 months ago
Compliance by Design for Artifact-Centric Business Processes
Compliance to legal regulations, internal policies, or best practices is becoming a more and more important aspect in business processes management. Compliance requirements are usu...
Niels Lohmann
RAID
2001
Springer
14 years 5 days ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner