Sciweavers

642 search results - page 54 / 129
» Detecting Spoofed Packets
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 4 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CISISSPAIN
2011
14 years 8 months ago
Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network Scans
In last decades there have been many proposals from the machine learning community in the intrusion detection field. One of the main problems that Intrusion Detection Systems (IDSs...
Silvia González, Javier Sedano, Álva...
LCN
2006
IEEE
15 years 10 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
ISCAS
2003
IEEE
162views Hardware» more  ISCAS 2003»
15 years 10 months ago
Content based error detection and concealment for image transmission over wireless channel
In this paper, we present a novel content-based image error detection and error concealment algorithm to improve the image quality degraded during its transmission over wireless c...
Shuiming Ye, Xinggang Lin, Qibin Sun
APNOMS
2006
Springer
15 years 8 months ago
Detecting and Identifying Network Anomalies by Component Analysis
Many research works address detection and identification of network anomalies using traffic analysis. This paper considers large topologies, such as those of an ISP, with traffic a...
Le The Quyen, Marat Zhanikeev, Yoshiaki Tanaka