Sciweavers

741 search results - page 86 / 149
» Tools and techniques for Network Forensics
Sort
View
LCN
1996
IEEE
14 years 1 months ago
A Class-Chest for Deriving Transport Protocols
Development of new transport protocols or protocol algorithms suffers from the complexity of the envir onment in which they ar e intended to run. Modeling techniques attempt to av...
W. Timothy Strayer
DEXAW
2004
IEEE
166views Database» more  DEXAW 2004»
14 years 19 days ago
Development of Flexible Peer-To-Peer Information Systems Using Adaptable Mobile Agents
Wide-area networks provide an easy access to many different distributed and heterogeneous data sources. The development of automated operating tools is still complex, particularly...
Jean-Paul Arcangeli, Sebastien Leriche, Marc Pante...
ICSE
2000
IEEE-ACM
14 years 15 days ago
Software engineering and middleware: a roadmap
The construction of a large class of distributed systems can be simplified by leveraging middleware, which is layered between network operating systems and application components....
Wolfgang Emmerich
CTW
2008
92views more  CTW 2008»
13 years 7 months ago
WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
RAID
1999
Springer
14 years 1 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen