Sciweavers

981 search results - page 132 / 197
» Semantics-aware trace analysis
Sort
View
SPIN
2009
Springer
15 years 9 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
SIGCOMM
2009
ACM
15 years 9 months ago
Opportunistic forwarding in workplaces
So far, the search for Opportunistic Network (ON) applications has focused on urban/rural scenarios where the combined use of mobility and the store-carry-and-forward paradigm hel...
Sabrina Gaito, Elena Pagani, Gian Paolo Rossi
CDC
2008
IEEE
131views Control Systems» more  CDC 2008»
15 years 9 months ago
Probabilistic testing for stochastic hybrid systems
— In this paper we propose a testing based method for safety/ reachability analysis of stochastic hybrid systems. Testing based methods are characterized by analysis based on the...
A. Agung Julius, George J. Pappas
SRDS
2008
IEEE
15 years 9 months ago
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
Large-scale distributed systems are subject to churn, i.e., continuous arrival, departure and failure of processes. Analysis of protocols under churn requires one to use churn mod...
Steven Y. Ko, Imranul Hoque, Indranil Gupta
ICNP
2007
IEEE
15 years 9 months ago
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations
— TCP is the dominant transport protocol used in the Internet and its performance fundamentally governs the performance of Internet applications. It is well-known that packet los...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith