Sciweavers

311 search results - page 39 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
92
Voted
WSC
2007
15 years 10 hour ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
DISCEX
2003
IEEE
15 years 3 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
64
Voted
KES
2006
Springer
14 years 9 months ago
Automatic Detection of SLS Violation Using Knowledge Based Systems
Self-Management of multiservice network domains must include automatic detection of service quality violations in order to perform appropriate and timely responses, fostering the f...
Pedro Alípio, José Neves, Paulo Carv...
IAT
2008
IEEE
15 years 4 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
FPL
2005
Springer
119views Hardware» more  FPL 2005»
15 years 3 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...