Sciweavers

231 search results - page 25 / 47
» A Host-Based Approach to Network Attack Chaining Analysis
Sort
View
87
Voted
JSAC
2007
130views more  JSAC 2007»
14 years 9 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
RAID
2007
Springer
15 years 3 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
WSC
2004
14 years 11 months ago
Enabling a Transforming Army at War: Analysis to Improve Logistics Network Efficiency and Effectiveness
This paper introduces and summarizes a comprehensive systems approach guiding an ongoing project addressing these significant challenges confronting logistics transformation. Curr...
Greg H. Parlier
ISVC
2007
Springer
15 years 3 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
IJON
2010
138views more  IJON 2010»
14 years 8 months ago
A dynamic Bayesian network to represent discrete duration models
Originally devoted to specific applications such as biology, medicine and demography, duration models are now widely used in economy, finance or reliability. Recent works in var...
Roland Donat, Philippe Leray, Laurent Bouillaut, P...