Sciweavers

96 search results - page 17 / 20
» Worm Traffic Analysis and Characterization
Sort
View
CSDA
2006
103views more  CSDA 2006»
14 years 11 months ago
LASS: a tool for the local analysis of self-similarity
The Hurst parameter H characterizes the degree of long-range dependence (and asymptotic selfsimilarity) in stationary time series. Many methods have been developed for the estimat...
Stilian Stoev, Murad S. Taqqu, Cheolwoo Park, Geor...
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 11 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CN
2006
124views more  CN 2006»
14 years 11 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini
ATAL
2010
Springer
15 years 27 days ago
Can we predict safety culture?
Safety culture is broadly recognized as important for Air Traffic Management and various studies have addressed its characterization and assessment. Nevertheless, relations betwee...
Alexei Sharpanskykh, Sybert H. Stroeve
DIMVA
2006
15 years 1 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...