Sciweavers

165 search results - page 10 / 33
» Soft computing in intrusion detection: the state of the art
Sort
View
DSOM
2007
Springer
15 years 3 months ago
Botnets for Scalable Management
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
Jérôme François, Radu State, O...
ACSW
2006
14 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
ICIP
2006
IEEE
15 years 11 months ago
Computation Error Tolerance in Motion Estimation Algorithms
In this paper we study the computation error tolerance properties of motion estimation algorithms. We are motivated by two scenarios where hardware systems may introduce computati...
Hye-Yeon Cheong, In Suk Chong, Antonio Ortega
ARTS
1999
Springer
15 years 1 months ago
Verifying Progress in Timed Systems
In this paper we study the issue of progress for distributed timed systems modeled as the parallel composition of timed automata. We clarify the requirements of discrete progress (...
Stavros Tripakis
IMC
2004
ACM
15 years 3 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese