Sciweavers

741 search results - page 67 / 149
» Tools and techniques for Network Forensics
Sort
View
134
Voted
UIST
1993
ACM
15 years 3 months ago
VB2: An Architecture for Interaction in Synthetic Worlds
This paper describes the VB2 architecture for the construction of three-dimensional interactive applications. The system's state and behavior are uniformly represented as a n...
Enrico Gobbetti, Jean-Francis Balaguer, Daniel Tha...
CORR
2010
Springer
118views Education» more  CORR 2010»
14 years 10 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
CSREASAM
2010
14 years 7 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
72
Voted
IMC
2004
ACM
15 years 4 months ago
Ten fallacies and pitfalls on end-to-end available bandwidth estimation
The area of available bandwidth (avail-bw) estimation has attracted significant interest recently, with several estimation techniques and tools developed during the last 2-3 year...
Manish Jain, Constantinos Dovrolis
96
Voted
JCM
2007
105views more  JCM 2007»
14 years 10 months ago
Generalization Capabilities Enhancement of a Learning System by Fuzzy Space Clustering
Abstract— We have used measurements taken on real network to enhance the performance of our radio network planning tool. A distribution learning technique is adopted to realize t...
Zakaria Nouir, Berna Sayraç, Benoît F...