Zobrazeno 1 - 10
of 160
pro vyhledávání: '"MOYER, THOMAS P."'
Autor:
Kapoor, Maya, Melton, Joshua, Ridenhour, Michael, Sriram, Mahalavanya, Moyer, Thomas, Krishnan, Siddharth
Complex heterogeneous dynamic networks like knowledge graphs are powerful constructs that can be used in modeling data provenance from computer systems. From a security perspective, these attributed graphs enable causality analysis and tracing for an
Externí odkaz:
http://arxiv.org/abs/2203.02744
Publikováno v:
2019 IEEE International Symposium on Technologies for Homeland Security
Programmable Logic Controllers are an integral component for managing many different industrial processes (e.g., smart building management, power generation, water and wastewater management, and traffic control systems), and manufacturing and control
Externí odkaz:
http://arxiv.org/abs/1911.06304
Internet of Things (IoT) has become a common paradigm for different domains such as health care, transportation infrastructure, smart home, smart shopping, and e-commerce. With its interoperable functionality, it is now possible to connect all domain
Externí odkaz:
http://arxiv.org/abs/1812.03966
Autor:
Pasquier, Thomas, Han, Xueyuan, Moyer, Thomas, Bates, Adam, Hermant, Olivier, Eyers, David, Bacon, Jean, Seltzer, Margo
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to th
Externí odkaz:
http://arxiv.org/abs/1808.06049
Data provenance is a valuable tool for protecting and troubleshooting distributed systems. Careful design of the provenance components reduces the impact on the design, implementation, and operation of the distributed system. In this paper, we presen
Externí odkaz:
http://arxiv.org/abs/1806.02227
Autor:
Pasquier, Thomas, Han, Xueyuan, Goldstein, Mark, Moyer, Thomas, Eyers, David, Seltzer, Margo, Bacon, Jean
Publikováno v:
SoCC '17 Proceedings of the 2017 Symposium on Cloud Computing
Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the reproducibility of scientific
Externí odkaz:
http://arxiv.org/abs/1711.05296
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Bates, Adam, Butler, Kevin, Dobra, Alin, Reaves, Brad, Cable, Patrick, Moyer, Thomas, Schear, Nabil
Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's act
Externí odkaz:
http://arxiv.org/abs/1609.00266
Autor:
Moyer, Thomas, Gadepally, Vijay
Whole-system data provenance provides deep insight into the processing of data on a system, including detecting data integrity attacks. The downside to systems that collect whole-system data provenance is the sheer volume of data that is generated un
Externí odkaz:
http://arxiv.org/abs/1608.03780
Publikováno v:
In Clinical Biochemistry February 2015 48(3):130-134