Sciweavers

144 search results - page 17 / 29
» Multidimensional Network Monitoring for Intrusion Detection
Sort
View
ICDE
2005
IEEE
147views Database» more  ICDE 2005»
15 years 3 months ago
Advanced Indexing Techniques for Wide-Area Network Monitoring
Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
Xin Li, Fang Bian, Hui Zhang 0002, Christophe Diot...
TEC
2002
166views more  TEC 2002»
14 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
SECON
2007
IEEE
15 years 3 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
15 years 11 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 4 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...