Sciweavers

1692 search results - page 283 / 339
» A Dynamic Network Interdiction Problem
Sort
View
TITS
2008
133views more  TITS 2008»
15 years 2 months ago
Fuzzy Control Model Optimization for Behavior-Consistent Traffic Routing Under Information Provision
This paper presents an H-infinity filtering approach to optimize a fuzzy control model used to determine behaviorconsistent (BC) information-based control strategies to improve the...
Alexander Paz, Srinivas Peeta
RAID
2009
Springer
15 years 9 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
AOSD
2005
ACM
15 years 8 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
INFOCOM
2010
IEEE
15 years 11 days ago
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
Monitoring transit traffic at one or more points in a network is of interest to network operators for reasons of traffic accounting, debugging or troubleshooting, forensics, and tr...
Saqib Raza, Guanyao Huang, Chen-Nee Chuah, Srini S...
DSOM
2003
Springer
15 years 7 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung