Sciweavers

8177 search results - page 56 / 1636
» Detecting System Emulators
Sort
View
CCR
2006
118views more  CCR 2006»
15 years 26 days ago
Tmix: a tool for generating realistic TCP application workloads in ns-2
In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "look...
Michele C. Weigle, Prashanth Adurthi, Félix...
ISSA
2008
15 years 2 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
94
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Opportunity Detection for OFDMA Systems with Timing Misalignment
— Accurate detection of spectrum opportunities within the frequency band of an orthogonal frequency division multiple access (OFDMA) system is a critical requirement for the real...
Mustafa E. Sahin, Ismail Güvenç, Moo-R...
140
Voted
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 3 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
95
Voted
CIS
2007
Springer
15 years 7 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang