OpenBSM

Known as: BSM, Basic Security Module 
OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) Audit API and file format. BSM, which is a system used for auditing… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Advances in diffusion-weighted magnetic resonance imaging (DW-MRI) have led to many alternative diffusion sampling strategies and… (More)
  • figure 1
  • table 1
  • table 2
  • figure 3
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The emerging cloud computing paradigm is rapidly gaining momentum as an alternative to traditional IT. However, contemporary… (More)
  • figure 2
  • figure 1
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We describe the development of a computational cognitive model that explains navigation behavior on the World Wide Web. The model… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The popularization of shared networks and Internet usage demands increases attention on information system security, particularly… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust… (More)
  • table I
  • table II
  • figure 1
  • table III
  • table IV
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify program behavior as normal or intrusive… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify program behavior as normal or intrusive… (More)
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Anomaly detection is an essential component of the protection mechanisms against novel attacks. In this paper, we propose to use… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We describe an experimental packet header anomaly detector (PHAD) that learns the normal range of values for 33 fields of the… (More)
  • table 4.1
  • table 4.3
  • table 4.5
  • table 5.1
  • table 7.2
Is this relevant?
Highly Cited
1988
Highly Cited
1988
The ability to engineer specific modifications within the coding region of a structural gene is a powerful tool with which to… (More)
Is this relevant?