Sciweavers

734 search results - page 133 / 147
» A Novel Quantitative Approach For Measuring Network Security
Sort
View
IJCNN
2006
IEEE
15 years 7 months ago
An Interval Type-II Robust Fuzzy Logic Controller for a Static Compensator in a Multimachine Power System
—This paper presents a novel fuzzy logic based controller for a Static Compensator (STATCOM) connected to a power system. Type-II fuzzy systems are selected that enable the contr...
Salman Mohagheghi, Ganesh K. Venayagamoorthy, Rona...
99
Voted
ICWSM
2008
15 years 3 months ago
Competing to Share Expertise: The Taskcn Knowledge Sharing Community
"Witkeys" are websites in China that form a rapidly growing web-based knowledge market. A user who posts a task also offers a small fee, and many other users submit thei...
Jiang Yang, Lada A. Adamic, Mark S. Ackerman
112
Voted
IMC
2006
ACM
15 years 7 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
132
Voted
RAID
2010
Springer
15 years 7 days ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
127
Voted
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 5 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna