Sciweavers

6689 search results - page 47 / 1338
» A Network Security Monitor
Sort
View
ICDCS
2010
IEEE
14 years 21 days ago
Quantifying and Querying Network Reachability
—Quantifying and querying network reachability is important for security monitoring and auditing as well as many aspects of network management such as troubleshooting, maintenanc...
Amir R. Khakpour, Alex X. Liu
EUROSEC
2010
ACM
14 years 3 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
ACSAC
2007
IEEE
14 years 3 months ago
Secure and Flexible Monitoring of Virtual Machines
The monitoring of virtual machines has many applications in areas such as security and systems management. A monitoring technique known as introspection has received significant ...
Bryan D. Payne, Wenke Lee
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
14 years 20 days ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
NETWORKING
2004
13 years 10 months ago
Distributed Channel Monitoring for Wireless Bandwidth Aggregation
Puneet Sharma, Sung-Ju Lee, Jack Brassil, Kang G. ...