Sciweavers

166 search results - page 11 / 34
» Detecting Performance Antipatterns in Component Based Enterp...
Sort
View
ACSW
2006
14 years 10 months ago
Grid-JQA: grid Java based quality of service management by active database
Task scheduling is an integrated component of computing. With the emergence of grid and ubiquitous computing, newer challenges have arisen in task scheduling. Unlike traditional p...
Leili Mohammad Khanli, Morteza Analoui
ESORICS
2011
Springer
13 years 9 months ago
Automated Information Flow Analysis of Virtualized Infrastructures
The use of server virtualization has been growing steadily, but many enterprises still are reluctant to migrate critical workloads to such infrastructures. One key inhibitor is the...
Sören Bleikertz, Thomas Groß, Matthias ...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 2 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
77
Voted
GECCO
2009
Springer
150views Optimization» more  GECCO 2009»
15 years 4 months ago
Integrating real-time analysis with the dendritic cell algorithm through segmentation
As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusio...
Feng Gu, Julie Greensmith, Uwe Aickelin
ICAC
2009
IEEE
15 years 4 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...