Sciweavers

361 search results - page 57 / 73
» Toward a Query Language for Network Attack Data
Sort
View
TON
2012
11 years 10 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ACSAC
2003
IEEE
13 years 11 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
ACSAC
2009
IEEE
14 years 2 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
ICCCN
2007
IEEE
14 years 2 months ago
A SpaceTime Oriented Macroprogramming Paradigm for Push-Pull Hybrid Sensor Networking
This paper proposes a spatio-temporal macroprogramming paradigm for push-pull hybrid wireless sensor networks (WSNs). The proposed paradigm, called SpaceTime Oriented Programming ...
Hiroshi Wada, Pruet Boonma, Junichi Suzuki
SIGMOD
2003
ACM
154views Database» more  SIGMOD 2003»
14 years 8 months ago
The Cougar Project: a work-in-progress report
We present an update on the status of the Cougar Sensor Database Project, in which we are investigating a database approach to sensor networks: Clients "program" the sen...
Alan J. Demers, Johannes Gehrke, Rajmohan Rajarama...