Sciweavers

595 search results - page 94 / 119
» Survivability Analysis of Network Specifications
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 2 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi
JCO
2006
67views more  JCO 2006»
15 years 1 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
ICUMT
2009
14 years 11 months ago
Application of smoothed estimators in spectrum sensing technique based on model selection
In cognitive radio networks, secondary user (SU) does not have rights to transmit when the primary user (PU) band is occupied, that's why a sensing technique must be done. Rec...
Bassem Zayen, Aawatif Hayar, Hamza Debbabi, Hichem...
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
CCS
2008
ACM
15 years 3 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...