Sciweavers

158 search results - page 11 / 32
» Distributed Detection over Time Varying Networks: Large Devi...
Sort
View
ESORICS
2009
Springer
15 years 8 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
80
Voted
CN
2007
98views more  CN 2007»
15 years 1 months ago
Analysis of point-to-point packet delay in an operational network
— In this paper we perform a detailed analysis of point-to-point packet delay in an operational tier-1 network. The point-to-point delay is the time between a packet entering a r...
Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konsta...
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 1 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
MASCOTS
2008
15 years 3 months ago
Tackling the Memory Balancing Problem for Large-Scale Network Simulation
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Hyojeong Kim, Kihong Park
VIZSEC
2005
Springer
15 years 7 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...