Sciweavers

361 search results - page 15 / 73
» Toward a Query Language for Network Attack Data
Sort
View
SIGMOD
2008
ACM
126views Database» more  SIGMOD 2008»
14 years 8 months ago
On efficient top-k query processing in highly distributed environments
Lately the advances in centralized database management systems show a trend towards supporting rank-aware query operators, like top-k, that enable users to retrieve only the most ...
Akrivi Vlachou, Christos Doulkeridis, Kjetil N&osl...
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 6 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
CCS
2008
ACM
13 years 10 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
INFOCOM
2009
IEEE
14 years 2 months ago
ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query
—With in-network sensor data storage and query, storage nodes are responsible for storing the data collected by sensor nodes and answering queries from users. Thus, without prope...
Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Q...
SYRCODIS
2008
184views Database» more  SYRCODIS 2008»
13 years 9 months ago
Towards Cost-based Query Optimization in Native XML Database Management Systems
In the last few years, XML became a de-facto standard for the exchange of structured and semi-structured data. The database research community took this development into account b...
Andreas M. Weiner, Christian Mathis, Theo Här...