Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Choose an application
With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science.
Computer networks --- Information visualization. --- Computer security. --- Security measures. --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer graphics. --- Pattern recognition. --- Computer Science. --- Data Encryption. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Pattern Recognition. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Digital techniques --- Distributed processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data visualization --- Visualization of information --- Information science --- Visual analytics --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection --- Security measures --- Computer vision. --- Optical pattern recognition. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Machine vision --- Vision, Computer --- Artificial intelligence --- Pattern recognition systems --- Data structures (Computer science) --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Optical equipment
Choose an application
Mathematical statistics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- patroonherkenning --- factoranalyse --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- programmatielogica --- computernetwerken
Choose an application
ETAPS 2001 was the fourth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprised ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), ten satellite workshops (CMCS, ETI Day, JOSES, LDTA, MMAABS, PFM, RelMiS, UNIGRA, WADT, WTUML), seven invited lectures, a debate, and ten tutorials. The events that comprise ETAPS address various aspects of the system de- lopment process, including speci cation, design, implementation, analysis, and improvement. The languages, methodologies, and tools which support these - tivities are all well within its scope. Di erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.
Computer programming --- Programming languages (Electronic computers) --- Programmation (Informatique) --- Langages de programmation --- Congresses. --- Congrès --- Computer science. --- Software engineering. --- Computer programming. --- Programming languages (Electronic computers). --- Computer logic. --- Mathematical logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Programming Languages, Compilers, Interpreters. --- Programming Techniques. --- Software Engineering. --- Logics and Meanings of Programs. --- Mathematical Logic and Formal Languages. --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Informatics --- Science --- Computer software engineering --- Engineering --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Computer science logic --- Logic, Symbolic and mathematical --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Programming --- Computer programming - Congresses --- Programming languages (Electronic computers) - Congresses
Choose an application
This book is Open Access under a CC BY licence.
Computer security. --- Software engineering. --- Artificial intelligence. --- Computer system performance. --- Computer science. --- Information theory. --- Systems and Data Security. --- Software Engineering/Programming and Operating Systems. --- Artificial Intelligence. --- System Performance and Evaluation. --- Computing Milieux. --- Theory of Computation. --- Communication theory --- Communication --- Cybernetics --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer system failures. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Calculators --- Cyberspace --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures --- Computer science --- Computer security --- Software engineering --- Artificial intelligence --- Computer system failures
Choose an application
With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract significant attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems. This volume presents four different visualization approaches, mainly applied to data from web server access logs. Understanding Intrusion Detection through Visualization is structured for security professionals, researchers and practitioners. This book is also suitable for graduate students in computer science.
Mathematical statistics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- patroonherkenning --- factoranalyse --- DES (data encryption standard) --- cryptologie --- grafische vormgeving --- programmatielogica --- computernetwerken
Choose an application
Choose an application
Choose an application
This book presents the most up-to-date research contributions focusing on progress in the field of physics education. It provides researches and results that are based on the most relevant matters in physics teacher education and how these matters can be improved for the satisfaction of both teachers and learners. The work is the by-product of the collaboration between GIREP (the International Research Group on Physics Teaching) and the University of Malta. The contributing authors present close examinations of the following topics: ICT and multimedia in teacher education; experiments and laboratory work in teacher education; the role of quantum mechanics in teaching and learning physics; formal, non-formal and informal aspects of physics education at the primary level; strategies for pre-service physics teacher education at all levels; and in-service teacher professional learning strategies. The editors hope that many different stakeholders within scientific academia will find something of value in this compilation of the current most advanced ideas in physics education.
Teacher education. Teacher's profession --- Teaching --- Didactics of sciences --- HO (hoger onderwijs) --- wetenschappen --- lerarenopleiding --- lesgeven
Listing 1 - 9 of 9 |
Sort by
|