Sciweavers

1737 search results - page 58 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
VIZSEC
2004
Springer
14 years 2 months ago
PortVis: a tool for port-based detection of security events
Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
CCS
2009
ACM
14 years 9 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
14 years 3 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
CCIA
2009
Springer
13 years 7 months ago
Patch Growing: Object segmentation using spatial coherence of local patches
Object segmentation is a challenging and important problem in computer vision. The difficulties to obtain accurate segmentations using only the traditional Topdown or Bottom-up ap...
Marc Masias, Albert Torrent, Xavier Lladó, ...
WSC
2004
13 years 10 months ago
Analysis of Supply Chains Using System Dynamics, Neural Nets, and Eigenvalues
Supply chain management is a critically significant strategy that enterprises depend on in meeting the challenges of today's highly competitive and dynamic business environme...
Luis Rabelo, Magdy Helal, Chalermmon Lertpattarapo...