Sciweavers

910 search results - page 132 / 182
» Automatic Metadata Generation using Associative Networks
Sort
View
110
Voted
CL
2010
Springer
15 years 18 days ago
Cost-driven autonomous mobility
Autonomous mobile programs (AMPs) offer a novel decentralised load management technology where periodic use is made of cost models to decide where to execute in a network. In this...
Xiao Yan Deng, Greg Michaelson, Philip W. Trinder
IJSN
2008
80views more  IJSN 2008»
15 years 14 days ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
102
Voted
ACSC
2006
IEEE
15 years 6 months ago
A JMX toolkit for merging network management systems
The ever increasing size of networks has resulted in a corresponding escalation of administration costs and lengthy deployment cycles. Clearly, more scalable and flexible network...
Feng Lu, Kris Bubendorfer
111
Voted
RAID
2004
Springer
15 years 5 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
DATE
2004
IEEE
130views Hardware» more  DATE 2004»
15 years 4 months ago
Utilizing Formal Assertions for System Design of Network Processors
System level modeling with executable languages such as C/C++ has been crucial in the development of large electronic systems from general processors to application specific desig...
Xi Chen, Yan Luo, Harry Hsieh, Laxmi N. Bhuyan, Fe...