Sciweavers

8177 search results - page 4 / 1636
» Detecting System Emulators
Sort
View
CODES
2006
IEEE
13 years 10 months ago
Automatic phase detection for stochastic on-chip traffic generation
During System on Chip (SoC) design, Network on Chip (NoC) prototyping is used for adapting NoC parameters to the application running on the chip. This prototyping is currently don...
Antoine Scherrer, Antoine Fraboulet, Tanguy Risset
AP2PS
2009
IEEE
14 years 29 days ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
DASC
2006
IEEE
14 years 6 days ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
JCIT
2008
138views more  JCIT 2008»
13 years 6 months ago
Real Time Automated Fabric Defect Detection System using Microcontroller
In a Least Developed Country (LDC) like Bangladesh where the textile is the main core of our economy; still there is a major drawback in this sector which is the defect detection ...
Tamnun E. Mursalin, Fajrana Zebin Eishita, Ahmed R...
WOSP
2004
ACM
13 years 11 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...