Sciweavers

546 search results - page 59 / 110
» Using and Detecting Links in Wikipedia
Sort
View
112
Voted
TDSC
2010
146views more  TDSC 2010»
14 years 7 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
GLOBECOM
2007
IEEE
15 years 6 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
115
Voted
ICWMC
2006
IEEE
15 years 6 months ago
A Predictive Handoff Approach for Mobile IP
: We present a predictive handoff mechanism that can predict the occurrence of L2 handoff well. It can be used as a trigger for Mobile IP to start network layer handoff ahead exact...
Da-Wei Zhang, Yi Yao
92
Voted
DISCEX
2003
IEEE
15 years 5 months ago
Modeling Multistep Cyber Attacks for Scenario Recognition
Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Steven Cheung, Ulf Lindqvist, Martin W. Fong
101
Voted
IVS
2008
124views more  IVS 2008»
15 years 14 days ago
Stories in GeoTime
is a powerful abstraction used by intelligence analysts to conceptualize threats and understand patterns as part of the analytical process. This paper demonstrates a system that d...
Ryan Eccles, Thomas Kapler, Robert Harper, William...