ACSAC
13 years 9 months ago
2004 IEEE
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
ACSAC
13 years 9 months ago
2004 IEEE
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
ACSAC
13 years 9 months ago
2004 IEEE
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
ACSAC
13 years 9 months ago
2004 IEEE ACSAC
13 years 9 months ago
2004 IEEE
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
|