A warehouse is a repository of integrated information drawn from remote data sources. Since a warehouse e ectively implements materialized views, we must maintain the views as the...
Yue Zhuge, Hector Garcia-Molina, Joachim Hammer, J...
In our previous work [1, 2] we studied detection of anomalies in packet arrival times for computer networks, most detection of denialof-service (DoS) attacks in Internet traffic....
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
Abstract— The increasing computing and communication capabilities of multi-function devices (MFDs) have enabled networks of such devices to provide value-added services. This has...
Andres Quiroz, Manish Parashar, Nathan Gnanasamban...