A framework for network-wide semantic event correlation [8757-8] (Englisch)
- Neue Suche nach: Hall, R.T.
- Neue Suche nach: Taylor, J.
- Neue Suche nach: SPIE (Society)
- Neue Suche nach: Hall, R.T.
- Neue Suche nach: Taylor, J.
- Neue Suche nach: Ternovskiy, Igor V.
- Neue Suche nach: Chin, Peter
- Neue Suche nach: SPIE (Society)
In:
Cyber sensing
;
8757 08
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A framework for network-wide semantic event correlation [8757-8]
-
Beteiligte:Hall, R.T. ( Autor:in ) / Taylor, J. ( Autor:in ) / Ternovskiy, Igor V. / Chin, Peter / SPIE (Society)
-
Kongress:Technical conference, Cyber sensing ; 2013 ; Baltimore, MD
-
Erschienen in:Cyber sensing ; 8757 08PROCEEDINGS- SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING ; 8757 ; 8757 08
-
Verlag:
- Neue Suche nach: SPIE
-
Erscheinungsort:Bellingham, Washington
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:8757 08
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 87570A
-
Software analysis in the semantic webTaylor, Joshua / Hall, Robert T. et al. | 2013
- 87570B
-
Remote suspect identification and the impact of demographic features on keystroke dynamicsDora, Robert A. / Schalk, Patrick D. / McCarthy, John E. / Young, Scott A. et al. | 2013
- 87570D
-
Dynamic malware analysis using IntroVirt: a modified hypervisor-based systemWhite, Joshua S. / Pape, Stephen R. / Meily, Adam T. / Gloo, Richard M. et al. | 2013
- 87570E
-
The two stages hierarchical unsupervised learning system for complex dynamic scene recognitionGraham, James / O'Connor, Alan / Ternovskiy, Igor V. / Ilin, Roman et al. | 2013
- 87570F
-
Performance comparison of the Prophecy (forecasting) Algorithm in FFT form for unseen feature and time-series predictionJaenisch, Holger / Handley, James et al. | 2013
- 87570G
-
A multi-resolution fractal additive scheme for blind watermarking of 3D point dataRahmes, Mark / Wilder, Kathy / Fox, Kevin et al. | 2013
- 87570H
-
A study of malware detection on smart mobile devicesYu, Wei / Zhang, Hanlin / Xu, Guobin et al. | 2013
- 87570J
-
Complex scenes and situations visualization in hierarchical learning algorithm with dynamic 3D NeoAxis engineGraham, James / Ternovskiy, Igor V. et al. | 2013
- 87570L
-
Secure it now or secure it later: the benefits of addressing cyber-security from the outsetOlama, Mohammed M. / Nutaro, James et al. | 2013
- 87570N
-
Digital microarray analysis for digital artifact genomicsJaenisch, Holger / Handley, James / Williams, Deborah et al. | 2013
- 875701
-
Front Matter: Volume 8757| 2013
- 875703
-
On localization attacks against cloud infrastructureGe, Linqiang / Yu, Wei / Sistani, Mohammad Ali et al. | 2013
- 875704
-
Quantitative analysis of intrusion detection systems: Snort and SuricataWhite, Joshua S. / Fitzsimmons, Thomas / Matthews, Jeanna N. et al. | 2013
- 875705
-
ICS logging solution for network-based attacks using Gumistix technologyOtis, Jeremy R. / Berman, Dustin / Butts, Jonathan / Lopez, Juan et al. | 2013
- 875708
-
A framework for network-wide semantic event correlationHall, Robert T. / Taylor, Joshua et al. | 2013
- 875709
-
Efficient identity management and access control in cloud environmentGloster, Jonathan et al. | 2013
-
Dynamic malware analysis using IntroVirt: a modified hypervisor-based system [8757-14]White, J.S. / Pape, S.R. / Meily, A.T. / Gloo, R.M. / SPIE (Society) et al. | 2013
-
Performance comparison of the Prophecy (forecasting) Algorithm in FFT form for unseen feature and time-series prediction [8757-16]Jaenisch, H. / Handley, J. / SPIE (Society) et al. | 2013
-
ICS logging solution for network-based attacks using Gumistix technology [8757-3]Otis, J.R. / Berman, D. / Butts, J. / Lopez, J. / SPIE (Society) et al. | 2013
-
Digital microarray analysis for digital artifact genomics [8757-31]Jaenisch, H. / Handley, J. / Williams, D. / SPIE (Society) et al. | 2013
-
Efficient identity management and access control in cloud environment [8757-9]Gloster, J. / SPIE (Society) et al. | 2013
-
A multi-resolution fractal additive scheme for blind watermarking of 3D point data [8757-17]Rahmes, M. / Wilder, K. / Fox, K. / SPIE (Society) et al. | 2013
-
Remote suspect identification and the impact of demographic features on keystroke dynamics [8757-12]Dora, R.A. / Schalk, P.D. / McCarthy, J.E. / Young, S.A. / SPIE (Society) et al. | 2013
-
Secure it now or secure it later: the benefits of addressing cyber-security from the outset [8757-25]Olama, M.M. / Nutaro, J. / SPIE (Society) et al. | 2013
-
A framework for network-wide semantic event correlation [8757-8]Hall, R.T. / Taylor, J. / SPIE (Society) et al. | 2013
-
A study of malware detection on smart mobile devices [8757-21]Yu, W. / Zhang, H. / Xu, G. / SPIE (Society) et al. | 2013
-
Quantitative analysis of intrusion detection systems: Snort and Suricata [8757-20]White, J.S. / Fitzsimmons, T. / Matthews, J.N. / SPIE (Society) et al. | 2013
-
On localization attacks against cloud infrastructure [8757-2]Ge, L. / Yu, W. / Sistani, M.A. / SPIE (Society) et al. | 2013
-
Software analysis in the semantic web [8757-10]Taylor, J. / Hall, R.T. / SPIE (Society) et al. | 2013