- Full text PDF available (4)
- This year (0)
- Last five years (6)
Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will… (More)
The Big Bone Lick area in Kentucky, the first widely known collecting locality for vertebrate fossils in North America, is being investigated for further faunal and geologic evidence. Mammal bones, ranging in age from Wisconsin (Tazewell?) to Recent, were recovered in 1962 from four different faunal zones in two terrace fills.
Networks are up against detecting dynamic and unknown threats. Anomaly-based neural network (NN) intrusion detection systems (IDSs) can manage this if trained and tested accordingly. This requires the IDS to be evaluated on how well it can detect these intrusions. Evaluating NN IDSs can be a complex and difficult task. One needs to be able to measure the… (More)
Firewalls are core elements in network security, the effectiveness of firewall security is dependent on configuring the firewall policy correctly. A firewall policy describes the access that will be permitted or denied from the trusted network. In a corporate network several firewalls are setup and administrated by different individuals. The consistency… (More)