Sciweavers

15 search results - page 3 / 3
» Salem numbers of negative trace
Sort
View
INFOCOM
2008
IEEE
14 years 1 days ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
ISSTA
2000
ACM
13 years 10 months ago
Finding bugs with a constraint solver
A method for finding bugs in code is presented. For given small numbers j and k, the code of a procedure is translated into a relational formula whose models represent all executi...
Daniel Jackson, Mandana Vaziri
FORTE
2003
13 years 7 months ago
Generation of All Counter-Examples for Push-Down Systems
We present a new, on-the-fly algorithm that given a push-down model representing a sequential program with (recursive) procedure calls and an extended finite-state automaton repr...
Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott ...
COMCOM
2006
151views more  COMCOM 2006»
13 years 5 months ago
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with increasing network usage demands from individual users as well as business communities. Most ...
Myung-Sup Kim, Young J. Won, James W. Hong
SIGCOMM
2009
ACM
14 years 4 days ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...