Sciweavers

765 search results - page 145 / 153
» Detecting Anomalies and Intruders
Sort
View
CNSM
2010
14 years 4 months ago
Semantic scheduling of active measurements for meeting network monitoring objectives
Network control and management techniques (e.g., dynamic path switching, on-demand bandwidth provisioning) rely on active measurements of end-to-end network status. These measureme...
Prasad Calyam, Lakshmi Kumarasamy, Füsun &Oum...
96
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
SIGOPS
2010
105views more  SIGOPS 2010»
14 years 4 months ago
SelfTalk for Dena: query language and runtime support for evaluating system behavior
We introduce SelfTalk, a novel declarative language that allows users to query and understand the status of a large scale system. SelfTalk is sufficiently expressive to encode an ...
Saeed Ghanbari, Gokul Soundararajan, Cristiana Amz...
AAAI
2006
14 years 11 months ago
Maintaining Cooperation in Noisy Environments
To prevent or alleviate conflicts in multi-agent environments, it is important to distinguish between situations where another agent has misbehaved intentionally and situations wh...
Tsz-Chiu Au, Dana S. Nau
82
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...