𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A survey of security visualization for computer network logs

✍ Scribed by Yanping Zhang; Yang Xiao; Min Chen; Jingyuan Zhang; Hongmei Deng


Book ID
112206299
Publisher
John Wiley and Sons
Year
2011
Tongue
English
Weight
785 KB
Volume
5
Category
Article
ISSN
1939-0114

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


A survey of visual sensor network platfo
✍ Bulent Tavli, Kemal Bicakci, Ruken Zilan, Jose M. Barcelo-Ordinas πŸ“‚ Article πŸ“… 2011 πŸ› Springer US 🌐 English βš– 779 KB
A hybrid intrusion detection system desi
✍ M. Ali AydΔ±n; A. Halim Zaim; K. GΓΆkhan Ceylan πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 629 KB

Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be

A neural network based computer access s
✍ A.S. Anagun; I. Cin πŸ“‚ Article πŸ“… 1998 πŸ› Elsevier Science 🌐 English βš– 361 KB

A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Three experiments were conducted to find a better way for a computer access security system. The neural networks are trained using time intervals betwe