Using Service Oriented Architecture and Component Based Development to Build Web Service Applications
Building an enterprise-scale software system is a complex undertaking. Despite decades of technological advances, the demands imposed by today’s information systems frequently stretch to breaking point a company’s ability to design, construct, and evolve its mission-critical software solutions. In particular, few new systems are designed from the ground up. Rather, a software architect’s task is […]
free research papers-network security-11
Free download research paper PIKE: Peer Intermediaries for Key Establishment in Sensor Networks PS, PDF, BIB. With Haowen Chan. Appears at research Infocom 2005. FIT: Fast Internet Traceback PS, PDF, BIB. With Avi Yaar and Dawn Song. Appears at research Infocom 2005. SPV: Secure Path Vector Routing for Securing BGP PS, PDF, BIB. With Yih-Chun […]
Data Mining Approaches for Intrusion Detection
In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques to discover consistent and useful patterns of system features that describe program and user behavior, and use the set of relevant system features to compute (inductively learned) classifiers that can […]