Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Brett Tjaden"'
Autor:
Brett Tjaden, Florian Buchholz
Publikováno v:
Digital Investigation. 4:31-42
In this paper we describe the first large-scale, long-term study of how hosts connected to the Internet manage their clocks. This is important for forensic investigations when there is a need for correlation of events collected from disparate sources
Autor:
Brett Tjaden, Brian Tjaden
Publikováno v:
ITiCSE
The security of computer systems, networks, and the Internet is becoming more critical by the day. Attacks on corporations, banks, schools, and government and international agencies are becoming more and more frequent, and the amount of damage that r
Publikováno v:
IMF
Typically, there is a direct correlation between the time to resolve an incident and the damage sustained by an organization, with faster resolution of the incident resulting in less damage to the organization. Therefore, improving coordination betwe
Autor:
Robert Floodeen, Brett Tjaden
Publikováno v:
ICCST
Responding to some future incident might require significant cooperation by multiple teams or organizations within an incident response community. To study the effectiveness of that cooperation, the Carnegie Mellon® Software Engineering Institute (S
Publikováno v:
ACSAC
Traditional biometric authentication systems store biometric reference templates in cleartext on an authentication server, making them vulnerable to theft. Fuzzy extractors allow an authentication server to store biometric verification data that are
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540408789
RAID
RAID
Integrated Network-Based Ohio University Network Detective Service (INBOUNDS) is a network based intrusion detection system being developed at Ohio University. The Anomalous Network-Traffic Detection with Self Organizing Maps (ANDSOM) module for INBO
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::042c6c30fd13b059b0e454cd8a276f04
https://doi.org/10.1007/978-3-540-45248-5_3
https://doi.org/10.1007/978-3-540-45248-5_3
Publikováno v:
Proceedings of the 33rd Southeastern Symposium on System Theory (Cat. No.01EX460).
With the growing threat of abuse of network resources, it becomes increasingly important to be able to detect malformed packets on a network and estimate the damage they fan cause. In this paper, we collect and analyze all of the IP and TCP packets s
Publikováno v:
IPDPS
This paper presents our design and tests of a realtime network monitoring program for DeSiDeRaTa, an existing resource management system. This monitor will assist DeSiDeRaTa in maintaining an acceptable Quality of Service (QoS) for groups of real-tim