Sciweavers

1112 search results - page 169 / 223
» On scalable attack detection in the network
Sort
View
VLDB
2005
ACM
87views Database» more  VLDB 2005»
15 years 5 months ago
NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems
In this demo, we present Nile-PDT, a Phenomenon Detection and Tracking framework using the Nile data stream management system. A phenomenon is characterized by a group of streams ...
Mohamed H. Ali, Walid G. Aref, Raja Bose, Ahmed K....
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 1 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
DSOM
2005
Springer
15 years 5 months ago
Decentralized Computation of Threshold Crossing Alerts
Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a certain ...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
ICCCN
2007
IEEE
15 years 6 months ago
Large-Scale QoS-Aware Service-Oriented Networking with a Clustering-Based Approach
—Motivated by the fact that most of the existing QoS service composition solutions have limited scalability, we develop a hierarchical-based solution framework to achieve scalabi...
Jingwen Jin, Jin Liang, Jingyi Jin, Klara Nahrsted...
ADHOC
2007
133views more  ADHOC 2007»
14 years 12 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...