Sciweavers

5668 search results - page 1102 / 1134
» Overlaps in Requirements Engineering
Sort
View
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
14 years 11 days ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
FLAIRS
2007
13 years 11 months ago
The Evolution and Evaluation of an Internet Search Tool for Information Analysts
We are working on a project aimed at building next generation analyst support tools that focus analysts’ attention on the most critical and novel information found within the da...
Elizabeth T. Whitaker, Robert L. Simpson Jr.
NSDI
2008
13 years 11 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
USENIX
2007
13 years 11 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
ASPLOS
2008
ACM
13 years 11 months ago
Hardbound: architectural support for spatial safety of the C programming language
The C programming language is at least as well known for its absence of spatial memory safety guarantees (i.e., lack of bounds checking) as it is for its high performance. C'...
Joe Devietti, Colin Blundell, Milo M. K. Martin, S...
« Prev « First page 1102 / 1134 Last » Next »