Sciweavers

1869 search results - page 299 / 374
» Analysis of Network Processing Workloads
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
USS
2008
15 years 5 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
CORR
2008
Springer
128views Education» more  CORR 2008»
15 years 2 months ago
Electricity Demand and Energy Consumption Management System
This project describes the electricity demand and energy consumption management system and its application to Southern Peru smelter. It is composted of an hourly demand-forecastin...
Juan Ojeda Sarmiento
IAJIT
2010
87views more  IAJIT 2010»
15 years 1 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
INFOCOM
2010
IEEE
15 years 1 months ago
A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling
—In network measurement systems, packet sampling techniques are usually adopted to reduce the overall amount of data to collect and process. Being based on a subset of packets, t...
Luigi Alfredo Grieco, Chadi Barakat