Sciweavers

2383 search results - page 338 / 477
» Anticipatory Behavioral Control
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
15 years 2 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
104
Voted
AAMAS
2006
Springer
15 years 26 days ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
90
Voted
FUIN
2008
119views more  FUIN 2008»
15 years 26 days ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch
95
Voted
ENTCS
2006
128views more  ENTCS 2006»
15 years 25 days ago
Web Verification: Perspective and Challenges
The Web poses novel and interesting problems for both programming language design and verification--and their intersection. This paper provides a personal outline of one thread of...
Shriram Krishnamurthi
ENVSOFT
2007
108views more  ENVSOFT 2007»
15 years 23 days ago
Modeling biocomplexity - actors, landscapes and alternative futures
: Increasingly, models (and modelers) are being asked to address the interactions between human influences, ecological processes, and landscape dynamics that impact many diverse as...
John P. Bolte, David W. Hulse, Stanley V. Gregory,...