Sciweavers

55 search results - page 4 / 11
» Misuse Detection in Database Systems Through User Profiling
Sort
View
ER
2004
Springer
125views Database» more  ER 2004»
14 years 23 days ago
Expressive Profile Specification and Its Semantics for a Web Monitoring System
Abstract. World wide web has gained a lot of prominence with respect to information retrieval and data delivery. With such a prolific growth, a user interested in a specific change...
Ajay Eppili, Jyoti Jacob, Alpa Sachde, Sharma Chak...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
13 years 11 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 9 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
BMCBI
2005
124views more  BMCBI 2005»
13 years 7 months ago
Internet-based profiler system as integrative framework to support translational research
Background: Translational research requires taking basic science observations and developing them into clinically useful tests and therapeutics. We have developed a process to dev...
Robert Kim, Francesca Demichelis, Jeffery Tang, Al...