Sciweavers

44 search results - page 6 / 9
» Evaluating the Impact of Automated Intrusion Response Mechan...
Sort
View
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 3 months ago
Evaluating the Quality of Models Extracted from Embedded Real-Time Software
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy sys...
Joel Huselius, Johan Kraft, Hans Hansson, Sasikuma...
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 9 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ICDCSW
2005
IEEE
15 years 5 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
LCN
2006
IEEE
15 years 6 months ago
Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor Networks
This paper describes BiSNET (Biologically-inspired architecture for Sensor NETworks), which addresses several key issues in multi-modal wireless sensor networks such as autonomy, ...
Pruet Boonma, Junichi Suzuki
WICOMM
2002
121views more  WICOMM 2002»
14 years 11 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta