Sciweavers

270 search results - page 47 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
107
Voted
DAC
2007
ACM
16 years 2 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
ISCI
2008
104views more  ISCI 2008»
15 years 19 days ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
92
Voted
CCS
2007
ACM
15 years 7 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
102
Voted
RAID
1999
Springer
15 years 5 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
97
Voted
WSCG
2004
118views more  WSCG 2004»
15 years 2 months ago
Combining Geometrical and Mechanical Displacements for Suppressing Intersections in Cartographic Generalization
This paper describes a method for suppressing spatial conflicts in cartographic generalization of isobathymetric lines. These lines are modeled by parametric curves. For that purp...
Eric Guilbert, Eric Saux, Marc Daniel