Sciweavers

797 search results - page 81 / 160
» Observing Success in the Pi-Calculus
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
DSN
2005
IEEE
15 years 3 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...
HICSS
2005
IEEE
191views Biometrics» more  HICSS 2005»
15 years 3 months ago
Business Models for Online Communities: The Case of the Virtual Worlds Industry in China
The rapid growth of Internet usage has enabled many new online communities to develop. A particularly interesting phenomenon that has arisen through Internet communities is the vi...
Ian MacInnes, Lili Hu
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Estimating Packet Arrival Times in Bursty Video Applications
In retransmission-based error-control methods, the most fundamental yet the paramount problem is to determine how long the sender (or the receiver) should wait before deciding tha...
Ali C. Begen, Yucel Altunbasak
GROUP
2005
ACM
15 years 3 months ago
What ideal end users teach us about collaborative software
Many studies have evaluated different uses of collaborative software. Typically, the research has focused on the shortcomings and, sometimes, the ways end users succeed or fail to...
David F. Redmiles, Hiroko Wilensky, Kristie Kosaka...