Sciweavers

1098 search results - page 145 / 220
» Proactive Intrusion Detection
Sort
View
GCC
2007
Springer
15 years 7 months ago
Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks
Many Internet applications use overlay networks as their basic facilities, like resource sharing, collaborative computing, and so on. Considering the communication cost, most over...
Zhenhua Li, Guihai Chen
RTSS
2009
IEEE
15 years 8 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
IMC
2004
ACM
15 years 7 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
CHI
2005
ACM
16 years 2 months ago
Using context-aware computing to reduce the perceived burden of interruptions from mobile devices
The potential for sensor-enabled mobile devices to proactively present information when and where users need it ranks among the greatest promises of ubiquitous computing. Unfortun...
Joyce Ho, Stephen S. Intille
ANSS
2000
IEEE
15 years 6 months ago
Modeling and Analysis of Software Aging and Rejuvenation
Software systems are known to suffer from outages due to transient errors. Recently, the phenomenon of “software aging”, one in which the state of the software system degrades...
Kishor S. Trivedi, Kalyanaraman Vaidyanathan, Kate...