Sciweavers

60 search results - page 10 / 12
» A Real-Time Network Traffic Profiling System
Sort
View
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 2 months ago
Performance Evaluation of Network Systems Accounting for User Behaviors
—Considering user behaviors in the performance evaluation of mobile networks is crucial as traffic generation in such networks is highly dependent on mobility and communication a...
Shigeru Kaneda, Akihito Hiromori, Yoshikazu Akinag...
TSMC
2002
100views more  TSMC 2002»
13 years 8 months ago
A LP-RR principle-based admission control for a mobile network
Abstract--In mobile networks, the traffic fluctuation is unpredictable due to mobility and varying resource requirement of multimedia applications. Hence, it is essential to mainta...
B. P. Vijay Kumar, P. Venkataram
CSREASAM
2006
13 years 9 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ECUMN
2007
Springer
14 years 2 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius