Sciweavers

7544 search results - page 1430 / 1509
» Network Forensics Analysis
Sort
View
INFOCOM
2007
IEEE
14 years 4 months ago
Gossiping with Multiple Messages
Abstract— This paper investigates the dissemination of multiple pieces of information in large networks where users contact each other in a random uncoordinated manner, and users...
Sujay Sanghavi, Bruce Hajek, Laurent Massouli&eacu...
CMSB
2007
Springer
14 years 4 months ago
A Unifying Framework for Modelling and Analysing Biochemical Pathways Using Petri Nets
We give a description of a Petri net-based framework for modelling and analysing biochemical pathways, which unifies the qualitative, stochastic and continuous paradigms. Each per...
David Gilbert, Monika Heiner, Sebastian Lehrack
RAID
2007
Springer
14 years 4 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
ACSAC
2006
IEEE
14 years 4 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
BIBE
2006
IEEE
139views Bioinformatics» more  BIBE 2006»
14 years 4 months ago
A Computational Inference Framework for analyzing Gene Regulation Pathway using Microarray Data
Microarray experiments produce gene expression data at such a high speed and volume that it is imperative to use highly specialized computational tools for their analyses. One grou...
Dong-Guk Shin, John Bluis, Yoo Ah Kim, Winfried Kr...
« Prev « First page 1430 / 1509 Last » Next »