Sciweavers

107 search results - page 13 / 22
» Visual Correlation of Host Processes and Network Traffic
Sort
View
ISVC
2007
Springer
14 years 1 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
WWW
2009
ACM
14 years 7 months ago
Network analysis of collaboration structure in Wikipedia
In this paper we give models and algorithms to describe and analyze the collaboration among authors of Wikipedia from a network analytical perspective. The edit network encodes wh...
Denise van Raaij, Jürgen Lerner, Patrick Keni...
CCR
2008
101views more  CCR 2008»
13 years 7 months ago
Empirical evaluation of hash functions for multipoint measurements
A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the p...
Christian Henke, Carsten Schmoll, Tanja Zseby
ACSAC
2003
IEEE
13 years 10 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
EACL
2009
ACL Anthology
13 years 4 months ago
Discovering Global Patterns in Linguistic Networks through Spectral Analysis: A Case Study of the Consonant Inventories
Recent research has shown that language and the socio-cognitive phenomena associated with it can be aptly modeled and visualized through networks of linguistic entities. However, ...
Animesh Mukherjee, Monojit Choudhury, Ravi Kannan