Sciweavers

32 search results - page 6 / 7
» Towards an Information-Theoretic Framework for Analyzing Int...
Sort
View
ROBOCOMM
2007
IEEE
13 years 11 months ago
Toward multi-level modeling of robotic sensor networks: a case study in acoustic event monitoring
—Modeling and simulation can be powerful tools for analyzing multi-agent systems, such as networked robotic systems and sensor networks. In this paper, it is shown concretely how...
Christopher M. Cianci, Thomas Lochmatter, Jim Pugh...
JMLR
2010
185views more  JMLR 2010»
13 years 6 days ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
VIZSEC
2004
Springer
13 years 10 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 3 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
JIPS
2007
223views more  JIPS 2007»
13 years 5 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson