Sciweavers

361 search results - page 17 / 73
» Toward a Query Language for Network Attack Data
Sort
View
CCS
2003
ACM
14 years 1 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ICDE
2005
IEEE
105views Database» more  ICDE 2005»
14 years 9 months ago
Representing and Querying Data Transformations
Modern information systems often store data that has been transformed and integrated from a variety of sources. This integration may obscure the original source semantics of data ...
John Mylopoulos, Renée J. Miller, Yannis Ve...
IJDMB
2008
105views more  IJDMB 2008»
13 years 7 months ago
Temporal representation for gene networks: towards a qualitative temporal data mining
: Recently lots of studies aim at modeling and inferring gene networks. Modeling tools propose graphical models having almost nothing about time description of events and regards t...
Nicolas Turenne, Sylviane R. Schwer
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
12 years 10 months ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
NCA
2006
IEEE
14 years 1 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...