Sciweavers

273 search results - page 22 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
ICNP
1998
IEEE
15 years 4 months ago
A Proof Technique for Liveness Properties of Multifunction Composite Protocols
In protocol composition techniques, component protocols are combined in various ways to obtain a complex protocol whose execution sequences consist of interleaved execution sequen...
J. Park, R. Miller
IPPS
2006
IEEE
15 years 5 months ago
Parallel morphological processing of hyperspectral image data on heterogeneous networks of computers
Recent advances in space and computer technologies are revolutionizing the way remotely sensed data is collected, managed and interpreted. The development of efficient techniques ...
Antonio J. Plaza
INFOCOM
2011
IEEE
14 years 3 months ago
A highly scalable bandwidth estimation of commercial hotspot access points
—WiFi access points that provide Internet access to users have been steadily increasing in urban areas. Different access points differ from one another in terms of services that ...
Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Li...
CCS
2006
ACM
15 years 3 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
RAID
1999
Springer
15 years 4 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee