Sciweavers

1112 search results - page 200 / 223
» On scalable attack detection in the network
Sort
View
70
Voted
ACSAC
2004
IEEE
15 years 1 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ATAL
2003
Springer
15 years 1 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
OSDI
2004
ACM
15 years 9 months ago
FUSE: Lightweight Guaranteed Distributed Failure Notification
FUSE is a lightweight failure notification service for building distributed systems. Distributed systems built with FUSE are guaranteed that failure notifications never fail. When...
John Dunagan, Nicholas J. A. Harvey, Michael B. Jo...
91
Voted
WWW
2010
ACM
15 years 4 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
IISWC
2008
IEEE
15 years 3 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley