Sciweavers

4947 search results - page 134 / 990
» Learning Module Networks
Sort
View
CCS
2009
ACM
15 years 9 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
AINA
2007
IEEE
15 years 8 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
ESAS
2007
Springer
15 years 8 months ago
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Ben Smyth, Mark Ryan, Liqun Chen
LCN
2006
IEEE
15 years 8 months ago
Maximizing Differentiated Throughput in IEEE 802.11e Wireless LANs
The throughput performance of the Distributed Coordination Function (DCF) of the IEEE 802.11 MAC protocol quickly degrades as the number of contending stations increases. To solve...
Jongwon Yoon, Sangki Yun, Hyogon Kim, Saewoong Bah...
ICEIS
2005
IEEE
15 years 8 months ago
Performing Real-Time Scheduling in an Interactive Audio-Streaming Application
: The CEDRIC and the IRCAM conduct since 2002 a project entitled "distributed orchestra" which proposes to coordinate on a network the actors of a musical orchestra (musi...
Julien Cordry, Nicolas Bouillot, Samia Bouzefrane