Sciweavers

71 search results - page 7 / 15
» Recovery from Malicious Transactions
Sort
View
JCP
2006
173views more  JCP 2006»
13 years 9 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 2 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
EUROSYS
2009
ACM
14 years 1 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
IEEEARES
2008
IEEE
14 years 3 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
13 years 9 months ago
Exploring the feasibility of proactive reputations
Reputation mechanisms help peers in a peer-to-peer (P2P) system avoid unreliable or malicious peers. In application-level networks, however, short peer life-times mean reputations...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...