Sciweavers

168 search results - page 8 / 34
» Ontology Change Detection Using a Version Log
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 8 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
DEXA
2005
Springer
118views Database» more  DEXA 2005»
14 years 1 months ago
Detecting Semantically Correct Changes to Relevant Unordered Hidden Web Data
Current proposals for XML change detection use structural constraints to detect the changes and they ignore semantic constraints. Consequently, they may produce semantically incorr...
Vladimir Kovalev, Sourav S. Bhowmick
ACSAC
2004
IEEE
14 years 5 days ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
DOCENG
2008
ACM
13 years 10 months ago
Merging changes in XML documents using reliable context fingerprints
Different dialects of XML have emerged as ubiquitous document exchange formats. For effective collaboration based on such documents, the capability to propagate edit operations pe...
Sebastian Rönnau, Christian Pauli, Uwe M. Bor...
SIGMOD
1996
ACM
84views Database» more  SIGMOD 1996»
14 years 17 days ago
Change Detection in Hierarchically Structured Information
Detecting and representing changes to data is important for active databases, data warehousing, view maintenance, and version and configuration management. Most previous work in c...
Sudarshan S. Chawathe, Anand Rajaraman, Hector Gar...