Sciweavers

357 search results - page 54 / 72
» An Approach to Detect Executable Content for Anomaly Based N...
Sort
View
ANCS
2006
ACM
14 years 1 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
CCS
2007
ACM
14 years 2 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
AADEBUG
1997
Springer
14 years 4 days ago
Modeling Intelligent System Execution as State Transition Diagrams to Support Debugging
Currently, few tools are available for assisting developers with debugging intelligent systems. Because these systems rely heavily on context dependent knowledge and sometimes sto...
Adele E. Howe, Gabriel Somlo
AAAI
2007
13 years 10 months ago
Temporal and Information Flow Based Event Detection from Social Text Streams
Recently, social text streams (e.g., blogs, web forums, and emails) have become ubiquitous with the evolution of the web. In some sense, social text streams are sensors of the rea...
Qiankun Zhao, Prasenjit Mitra, Bi Chen
ECOOPWEXCEPTION
2006
Springer
13 years 11 months ago
Failure Handling in a Network-Transparent Distributed Programming Language
Abstract. This paper shows that asynchronous fault detection is a practical way to reflect partial failure in a network-transparent distributed programming language. In the network...
Raphaël Collet, Peter Van Roy