Sciweavers

311 search results - page 41 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
CIT
2004
Springer
15 years 3 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
15 years 2 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
84
Voted
INFOCOM
2007
IEEE
15 years 4 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
158
Voted
NETGAMES
2006
ACM
15 years 3 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
83
Voted
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
14 years 10 months ago
Developing neural structure of two agents that play checkers using cartesian genetic programming
A developmental model of neural network is presented and evaluated in the game of Checkers. The network is developed using cartesian genetic programs (CGP) as genotypes. Two agent...
Gul Muhammad Khan, Julian Francis Miller, David M....