Sciweavers

429 search results - page 84 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
VIZSEC
2005
Springer
14 years 17 days ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
TON
2010
300views more  TON 2010»
13 years 5 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
EXPERT
2002
146views more  EXPERT 2002»
13 years 6 months ago
The Frame-Based Module of the SUISEKI Information Extraction System
names in the same abstract already indicates a relation between them. Because of its simplicity, we can apply this approach to large amounts of text and establish interaction netwo...
Christian Blaschke, Alfonso Valencia
UM
2005
Springer
14 years 17 days ago
Modeling Individual and Collaborative Problem Solving in Medical Problem-Based Learning
Abstract. Since problem solving in group problem-based learning is a collaborative process, modeling individuals and the group is necessary if we wish to develop an intelligent tut...
Siriwan Suebnukarn, Peter Haddawy