Sciweavers

653 search results - page 3 / 131
» The stepping stones project
Sort
View
AINA
2009
IEEE
14 years 4 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
AINA
2008
IEEE
14 years 27 days ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang
WABI
2007
Springer
109views Bioinformatics» more  WABI 2007»
14 years 5 months ago
Two Birds, One Stone: Selecting Functionally Informative Tag SNPs for Disease Association Studies
Selecting an informative subset of SNPs, generally referred to as tag SNPs, to genotype and analyze is considered to be an essential step toward effective disease association studi...
Phil Hyoun Lee, Hagit Shatkay