Sciweavers

3418 search results - page 461 / 684
» Security for Grid Services
Sort
View
ACSAC
2001
IEEE
14 years 2 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch
CSFW
1995
IEEE
14 years 2 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
IMF
2007
14 years 6 days ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay
VIS
2004
IEEE
150views Visualization» more  VIS 2004»
15 years 8 hour ago
Building an Ontology of Visualization
Recent activity within the UK National e-Science Programme has identified a need to establish an ontology for visualization. Motivation for this includes defining web and grid ser...
David J. Duke, Ken W. Brodlie, David A. Duce
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
14 years 5 months ago
Modeling the Impact of Increasing PHEV Loads on the Distribution Infrastructure
Numerous recent reports have assessed the adequacy of current generating capacity to meet the growing electricity demand from Plug-in Hybrid Electric Vehicles (PHEVs) and the pote...
Chris Farmer, Paul Hines, Jonathan Dowds, Seth Blu...