Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Marchany, Randolph"'
Publikováno v:
In Forensic Science International: Digital Investigation September 2023 46
Autor:
Marchany, Randolph C.
Real-time digital music system design often involves the translation of formal music notation or human gestures by some input device to Musical Instrument Digital Interface (MIDI) commands which are then transmitted to an electronic music synthesizer
Externí odkaz:
http://hdl.handle.net/10919/35500
http://scholar.lib.vt.edu/theses/available/etd-10262005-055115/
http://scholar.lib.vt.edu/theses/available/etd-10262005-055115/
Data-driven network security and information security efforts have decades long history. The deluge of logged events from network mid-points and end-points coupled with unprecedented temporal depth in data retention are driving an emerging market for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::96503f74ba697c4bb831a60dba42ee1a
https://hdl.handle.net/10919/77421
https://hdl.handle.net/10919/77421
Autor:
Salman, Mohammed, Welch, Brian, Raymond, David Richard, Marchany, Randolph C., Tront, Joseph G.
With wider adoption of micro-service based architectures in cloud and distributed systems, logging and monitoring costs have become increasingly relevant topics of research. There are a large number of log analysis tools such as the ELK(ElasticSearch
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::62b5a52666c5c7e7010989151cc0bb3c
https://hdl.handle.net/10919/77388
https://hdl.handle.net/10919/77388
The goal of our research is to protect sensitive communications, which are commonly used by government agencies, from eavesdroppers or social engineers. In prior work, we investigated the privacy implications of stateless and stateful address autocon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::9c7b5f58a34f309452a652c7b5a7d378
https://hdl.handle.net/10919/84190
https://hdl.handle.net/10919/84190
Autor:
Straub, Kayla M., Sengupta, Avik, Ernst, Joseph M., McGwier, Robert W., Watchorn, Merrick, Tilley, Richard, Marchany, Randolph
Publikováno v:
MILCOM 2016 - 2016 IEEE Military Communications Conference; 2016, p497-502, 6p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Parallel & Distributed Systems; May2007, Vol. 18 Issue 5, p577-588, 12p, 3 Black and White Photographs, 1 Diagram, 1 Chart, 4 Graphs
Autor:
Karanam, Sanjula
Ransomware is an ever-growing issue that has been affecting individuals and corporations since its inception, leading to losses of the order of billions each year. This research builds upon the existing body of research pertaining to ransomware detec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::2677cf143de1e445d2ea0be2d1febd56
https://hdl.handle.net/10919/115272
https://hdl.handle.net/10919/115272
Autor:
Sagayam, Arul Thileeban
Intrusion detection systems are an integral part of web application security. As Internet use continues to increase, the demand for fast, accurate intrusion detection systems has grown. Various IDSs like Snort, Zeek, Solarwinds SEM, and Sleuth9, dete
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2485::a2325e7d48b0f0f3ab0a0f402dbe44fa
https://hdl.handle.net/10919/103471
https://hdl.handle.net/10919/103471