Sciweavers

507 search results - page 86 / 102
» Attacking DDoS at the Source
Sort
View
EUC
2007
Springer
15 years 1 months ago
Parallel Network Intrusion Detection on Reconfigurable Platforms
With the wide adoption of internet into our everyday lives, internet security becomes an important issue. Intrusion detection at the network level is an effective way of stopping m...
Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, E...
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 1 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
GECCO
2006
Springer
135views Optimization» more  GECCO 2006»
15 years 1 months ago
A tree-based genetic algorithm for building rectilinear Steiner arborescences
A rectilinear Steiner arborescence (RSA) is a tree, whose nodes include a prescribed set of points, termed the vertices, in the first quadrant of the Cartesian plane, and whose tr...
William A. Greene
ACSAC
2001
IEEE
15 years 1 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith
WSC
2007
15 years 4 days ago
Defense and homeland security applications of multi-agent simulations
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS natio...
Thomas W. Lucas, Susan M. Sanchez, Felix Martinez,...