Sciweavers

546 search results - page 88 / 110
» Behavioral experiments in networked trade
Sort
View
DSN
2000
IEEE
15 years 6 months ago
Benchmarking Anomaly-Based Detection Systems
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior suggest the presence of intentionally or unintention...
Roy A. Maxion, Kymie M. C. Tan
ACSAC
2004
IEEE
15 years 5 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
AINA
2004
IEEE
15 years 5 months ago
Balancing Workload based on Content Types for Scalable Web Server Clusters
With the rapid growth of information stored in worldwide web servers, searching and capturing data on Internet become a common behavior for us. In order to increase the availabili...
Tzung-Shi Chen, Kuo-Lian Chen
DSOM
2008
Springer
15 years 3 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
P2P
2010
IEEE
127views Communications» more  P2P 2010»
14 years 11 months ago
Waiting for Anonymity: Understanding Delays in the Tor Overlay
Although Tor is the most widely used overlay for providing anonymity services, its users often experience very high delays. Because much of Tor usage is for Web applications, which...
Prithula Dhungel, Moritz Steiner, Ivinko Rimac, Vo...