Sciweavers

8080 search results - page 130 / 1616
» From Computer Networks to Agent Networks
Sort
View
134
Voted
ECAI
2004
Springer
15 years 8 months ago
Towards Efficient Learning of Neural Network Ensembles from Arbitrarily Large Datasets
Advances in data collection technologies allow accumulation of large and high dimensional datasets and provide opportunities for learning high quality classification and regression...
Kang Peng, Zoran Obradovic, Slobodan Vucetic
IJISEC
2006
119views more  IJISEC 2006»
15 years 3 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
KIVS
2005
Springer
15 years 8 months ago
Improving the Usable Capacity of Ad Hoc Networks
Recent research has shown that multi-hop ad hoc networks suffer from a low capacity and moreover that an individual node’s capacity for long-distance communication decreases the...
Christian Maihöfer, Tim Leinmüller, Rein...
IAW
2003
IEEE
15 years 8 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
RAID
2010
Springer
15 years 1 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...