Sciweavers

6812 search results - page 99 / 1363
» Detection of Information Flows
Sort
View
LCN
2006
IEEE
15 years 7 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
IPPS
2006
IEEE
15 years 7 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
ACIVS
2006
Springer
15 years 7 months ago
Water Flow Based Complex Feature Extraction
A new general framework for shape extraction is presented, based on the paradigm of water flow. The mechanism embodies the fluidity of water and hence can detect complex shapes. A ...
Xin U. Liu, Mark S. Nixon
SP
2000
IEEE
15 years 5 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
IOT
2010
14 years 10 months ago
Supporting interaction with the Internet of Things across objects, time and space
Effectively assisting people in complex and highly dynamic work environment requires advances in high-level declarative activity models that can describe the flow of human work act...
Fahim Kawsar, Gerd Kortuem, Bashar Altakrouri