Sciweavers

1244 search results - page 153 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
High Speed Pattern Matching for Network IDS/IPS
— The phenomenal growth of the Internet in the last decade and society’s increasing dependence on it has brought along, a flood of security attacks on the networking and compu...
Mansoor Alicherry, Muthusrinivasan Muthuprasanna, ...
134
Voted
ICMCS
1994
IEEE
85views Multimedia» more  ICMCS 1994»
15 years 8 months ago
Synchronization of Temporal Constructs in Distributed Multimedia Systems with Controlled Accuracy
Abstract. Withthe inceptionof technology in communication networks suchasATM, it will be possible to run multimedia applications on future integrated networks. Synchronizationof th...
Sang Hyuk Son, Nipun Agarwal
138
Voted
ACSAC
2010
IEEE
15 years 2 months ago
Toward worm detection in online social networks
Worms propagating in online social networking (OSN) websites have become a major security threat to both the websites and their users in recent years. Since these worms exhibit un...
Wei Xu, Fangfang Zhang, Sencun Zhu
OSDI
2004
ACM
16 years 5 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
IJON
2006
146views more  IJON 2006»
15 years 4 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang