Sciweavers

361 search results - page 55 / 73
» Toward a Query Language for Network Attack Data
Sort
View
INTERNET
2007
103views more  INTERNET 2007»
13 years 7 months ago
Publish-Subscribe Information Delivery with Substring Predicates
The content-based publish/subscribe (pub/sub)paradigm for system design is becoming increasingly popular, offering unique benefits for a large number of data-intensive applicatio...
Ioannis Aekaterinidis, Peter Triantafillou
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
NOMS
2006
IEEE
146views Communications» more  NOMS 2006»
14 years 1 months ago
BGP-Inspect - Extracting Information from Raw BGP Data
— While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and net...
Dionysus Blazakis, Manish Karir, John S. Baras
WWW
2002
ACM
14 years 8 months ago
EDUTELLA: a P2P networking infrastructure based on RDF
Metadata for the World Wide Web is important, but metadata for Peer-to-Peer (P2P) networks is absolutely crucial. In this paper we discuss the open source project Edutella which b...
Ambjörn Naeve, Boris Wolf, Changtao Qu, Matth...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 9 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray