Sciweavers

2338 search results - page 293 / 468
» Community computing and the computing community
Sort
View
124
Voted
CCS
2006
ACM
15 years 7 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
152
Voted
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
15 years 5 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
126
Voted
WSC
2004
15 years 5 months ago
Future of Simulation in Biotechnology Industry
In the 21st century, the Biotechnology industry has the potential to inspire a number of management tools and theories, just as the Automobile industry did in the 20th century. Th...
Prasad V. Saraph
116
Voted
CCR
2010
139views more  CCR 2010»
15 years 3 months ago
Longitudinal study of BGP monitor session failures
BGP routing data collected by RouteViews and RIPE RIS have become an essential asset to both the network research and operation communities. However, it has long been speculated t...
Pei-chun Cheng, Xin Zhao, Beichuan Zhang, Lixia Zh...
115
Voted
CCR
2008
76views more  CCR 2008»
15 years 3 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford