Sciweavers

185 search results - page 33 / 37
» Traffic classification on the fly
Sort
View
103
Voted
ICARIS
2007
Springer
15 years 3 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
ESORICS
2000
Springer
15 years 1 months ago
A Full Bandwidth ATM Firewall
The ATM technology has been specified to provide users with the ability to request quality of service (QoS) for their applicatio ns and to enable high speed communications. Howeve...
Olivier Paul, Maryline Laurent, Sylvain Gombault
CEAS
2008
Springer
14 years 11 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
CSSE
2008
IEEE
14 years 11 months ago
The Design and Implementation of Ontology and Rules Based Knowledge Base for Transportation
: The traditional transportation information inquiry mainly uses key words based on the text, and the service the inquiry system provided is onefold and only aims at one transporti...
Gang Cheng, Qingyun Du, Hongli Ma
WICON
2008
14 years 11 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar