Sciweavers

772 search results - page 147 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
STORAGESS
2005
ACM
14 years 3 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CGA
2005
13 years 9 months ago
Designing a Visualization Framework for Multidimensional Data
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...
ICDM
2007
IEEE
196views Data Mining» more  ICDM 2007»
14 years 4 months ago
Diagnosing Similarity of Oscillation Trends in Time Series
Sensor networks have increased the amount and variety of temporal data available, requiring the definition of new techniques for data mining. Related research typically addresses...
Leonardo E. Mariote, Claudia Bauzer Medeiros, Rica...
BMCBI
2004
150views more  BMCBI 2004»
13 years 9 months ago
Cross-species comparison significantly improves genome-wide prediction of cis-regulatory modules in Drosophila
Background: The discovery of cis-regulatory modules in metazoan genomes is crucial for understanding the connection between genes and organism diversity. It is important to quanti...
Saurabh Sinha, Mark D. Schroeder, Ulrich Unnerstal...