Sciweavers

198 search results - page 18 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
16 years 3 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
133
Voted
ICWN
2004
15 years 5 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
143
Voted
COMCOM
2006
154views more  COMCOM 2006»
15 years 3 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
144
Voted
IJUFKS
2000
111views more  IJUFKS 2000»
15 years 3 months ago
A Factorized Representation of Independence of Causal Influence and Lazy Propagation
Theefficiency of algorithmsfor probabilistic inference in Bayesian networks can be improvedby exploiting independenceof causal influence. Thefactorized representation of independe...
Anders L. Madsen, Bruce D'Ambrosio
125
Voted
SAC
2010
ACM
15 years 10 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...