Sciweavers

1737 search results - page 50 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TOCS
1998
114views more  TOCS 1998»
13 years 8 months ago
Performance Evaluation of the Orca Shared-Object System
Orca is a portable, object-based distributed shared memory system. This paper studies and evaluates the design choices made in the Orca system and compares Orca with other DSMs. T...
Henri E. Bal, Raoul Bhoedjang, Rutger F. H. Hofman...
AISM
2004
13 years 10 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
SIGCOMM
2010
ACM
13 years 9 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
ADBIS
2006
Springer
200views Database» more  ADBIS 2006»
14 years 3 months ago
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data
The anomaly detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. This paper is concerned with the prob...
Zakia Ferdousi, Akira Maeda
ICASSP
2008
IEEE
14 years 3 months ago
Belief propagation distributed estimation in sensor networks: An optimized energy accuracy tradeoff
The estimation error performance of Gaussian belief propagation based distributed estimation in a large sensor network employing random sleep strategies is explicitly evaluated fo...
John MacLaren Walsh, Phillip A. Regalia