Sciweavers

5234 search results - page 187 / 1047
» Simulation of Computer Network Attacks
Sort
View
113
Voted
CSREASAM
2010
14 years 11 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
126
Voted
FLAIRS
2003
15 years 4 months ago
LIDS: Learning Intrusion Detection System
The detection of attacks against computer networks is becoming a harder problem to solve in the field of network security. The dexterity of the attackers, the developing technolog...
Mayukh Dass, James Cannady, Walter D. Potter
116
Voted
E2EMON
2006
IEEE
15 years 8 months ago
Active Probing Approach for Fault Localization in Computer Networks
—Active probing is an active network monitoring technique that has potential for developing effective solutions for fault localization. In this paper we use active probing to pre...
Maitreya Natu, Adarshpal S. Sethi
106
Voted
WCNC
2008
IEEE
15 years 9 months ago
Computing TCP Throughput in a UMTS Network
— We compute the throughput obtained by a TCP connection in a UMTS environment. For downloading data at a mobile terminal, the packets of each TCP connection are stored in separa...
Kunde Anand, Vinod Sharma
126
Voted
IPPS
2006
IEEE
15 years 8 months ago
Cooperative load balancing for a network of heterogeneous computers
In this paper we present a game theoretic approach to solve the static load balancing problem in a distributed system which consists of heterogeneous computers connected by a sing...
Satish Penmatsa, Anthony T. Chronopoulos