Sciweavers

450 search results - page 15 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
15 years 3 months ago
Summarization - Compressing Data into an Informative Representation
In this paper, we formulate the problem of summarization of a dataset of transactions with categorical attributes as an optimization problem involving two objective functions - co...
Varun Chandola, Vipin Kumar
TON
2010
161views more  TON 2010»
14 years 4 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...
ACMSE
2008
ACM
14 years 11 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
CCN
2006
278views Communications» more  CCN 2006»
14 years 11 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
WWIC
2007
Springer
123views Communications» more  WWIC 2007»
15 years 3 months ago
An Experimental Investigation of the Congestion Control Used by Skype VoIP
Abstract. The explosive growth of VoIP trac poses a potential challenge to the stability of the Internet that, up to now, has been guaranteed by the TCP congestion control. In thi...
Luca De Cicco, Saverio Mascolo, Vittorio Palmisano