Sciweavers

44 search results - page 6 / 9
» Evaluating the Impact of Automated Intrusion Response Mechan...
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 1 months ago
Evaluating the Quality of Models Extracted from Embedded Real-Time Software
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy sys...
Joel Huselius, Johan Kraft, Hans Hansson, Sasikuma...
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ICDCSW
2005
IEEE
15 years 3 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
LCN
2006
IEEE
15 years 3 months ago
Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor Networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), which addresses several key issues in multi-modal wireless sensor networks such as autonomy, ...
Pruet Boonma, Junichi Suzuki
WICOMM
2002
121views more  WICOMM 2002»
14 years 9 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta