Sciweavers

589 search results - page 22 / 118
» Accurate Dependability Analysis of CAN-Based Networked Syste...
Sort
View
TELETRAFFIC
2007
Springer
15 years 8 months ago
Performance Analysis of Peer-to-Peer Storage Systems
This paper evaluates the performance of two schemes for recovering lost data in a peer-to-peer (P2P) storage systems. The first scheme is centralized and relies on a server that r...
Sara Alouf, Abdulhalim Dandoush, Philippe Nain
IJCNN
2000
IEEE
15 years 6 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
IJRR
2011
210views more  IJRR 2011»
14 years 8 months ago
Visual-Inertial Sensor Fusion: Localization, Mapping and Sensor-to-Sensor Self-calibration
Visual and inertial sensors, in combination, are able to provide accurate motion estimates and are well-suited for use in many robot navigation tasks. However, correct data fusion...
Jonathan Kelly, Gaurav S. Sukhatme
101
Voted
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 8 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
VIZSEC
2005
Springer
15 years 7 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...