Sciweavers

2503 search results - page 239 / 501
» Building Computer Network Attacks
Sort
View
152
Voted
ACSAC
2003
IEEE
15 years 6 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
139
Voted
ERLANG
2006
ACM
15 years 8 months ago
Concurrency oriented programming in termite scheme
Termite Scheme is a variant of Scheme intended for distributed computing. It offers a simple and powerful concurrency model, inspired by the Erlang programming language, which is ...
Guillaume Germain
PERCOM
2010
ACM
15 years 29 days ago
Incremental awareness and compositionality: A design philosophy for context-aware pervasive systems
Context-aware pervasive systems are an important emerging category of software, increasingly pervading into daily life, play and work. These systems are characterized by capabilit...
Seng Wai Loke
136
Voted
UAI
2000
15 years 3 months ago
Pivotal Pruning of Trade-offs in QPNs
Qualitative probabilistic networks have been designed for probabilistic reasoning in a qualitative way. Due to their coarse level of representation detail, qualitative probabilist...
Silja Renooij, Linda C. van der Gaag, Simon Parson...
106
Voted
EXPCS
2007
15 years 6 months ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...