Sciweavers

1804 search results - page 177 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IMC
2009
ACM
15 years 11 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICDCS
1999
IEEE
15 years 8 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
JSAC
2008
128views more  JSAC 2008»
15 years 4 months ago
Iterative frequency domain channel estimation for dft-precoded ofdm systems using in-band pilots
We consider two techniques of in-band frequency domain multiplexed (FDM) pilots using interleaved frequency domain multiple access (IFDMA) signal with a Chu sequence for DFT-precod...
Chan-Tong Lam, David D. Falconer, Florence Danilo-...
ISCAPDCS
2004
15 years 5 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
IPPS
2009
IEEE
15 years 11 months ago
Annotation-based empirical performance tuning using Orio
In many scientific applications, significant time is spent tuning codes for a particular highperformance architecture. Tuning approaches range from the relatively nonintrusive (...
Albert Hartono, Boyana Norris, Ponnuswamy Sadayapp...