Sciweavers

4307 search results - page 329 / 862
» Dynamic Spyware Analysis
Sort
View
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 4 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
AUTOMATICA
2008
126views more  AUTOMATICA 2008»
15 years 3 months ago
Local stability analysis using simulations and sum-of-squares programming
The problem of computing bounds on the region-of-attraction for systems with polynomial vector fields is considered. Invariant subsets of the region-of-attraction are characterize...
Ufuk Topcu, Andrew K. Packard, Peter Seiler
COMCOM
2008
244views more  COMCOM 2008»
15 years 3 months ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior
DEDS
2008
127views more  DEDS 2008»
15 years 3 months ago
Diagnosability Analysis of a Class of Hierarchical State Machines
This paper addresses the problem of Fault Detection and Isolation for a particular class of discrete event dynamical systems called Hierarchical Finite State Machines (HFSMs). A ne...
Andrea Paoli, Stéphane Lafortune
CN
2006
82views more  CN 2006»
15 years 3 months ago
Fluid-flow analysis of TCP Westwood with RED
This paper concerns TCP Westwood, a recently developed modification of TCP, in combination with RED queue management. We develop a fluid-flow model of the protocol, and use it to s...
Jiwei Chen, Fernando Paganini, M. Y. Sanadidi, Ren...