Sciweavers

37 search results - page 4 / 8
» Identifying MMORPG bots: a traffic analysis approach
Sort
View
JSAC
2006
165views more  JSAC 2006»
14 years 9 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
DSS
2006
138views more  DSS 2006»
14 years 9 months ago
Design of a shopbot and recommender system for bundle purchases
The increasing proliferation of online shopping and purchasing has naturally led to a growth in the popularity of comparisonshopping search engines, popularly known as "shopb...
Robert S. Garfinkel, Ram D. Gopal, Arvind K. Tripa...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 3 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
ISCC
2002
IEEE
15 years 2 months ago
Analyzing quality of service of GPRS network systems from a user's perspective
With reference to the General Packet Radio Service (GPRS), an extension of the Global System Mobile Communication (GSM) addressing packetoriented traffic, this paper contributes t...
Stefano Porcarelli, Felicita Di Giandomenico, Andr...
MACOM
2010
14 years 7 months ago
Quality of Service Oriented Analysis of Cross-Layer Design in Wireless Ad Hoc Networks
Abstract. In wireless ad hoc networks, cross-layer design aims at reducing multiple access interference and thus obtaining a higher spatial reuse. In order to identify the most sui...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...