Sciweavers

159 search results - page 28 / 32
» Anomaly Detection in P2P Networks Using Markov Modelling
Sort
View
RAID
1999
Springer
14 years 24 days ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
WCNC
2008
IEEE
14 years 2 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
MASCOTS
2004
13 years 10 months ago
An Optimisation Model for a Two-Node Router Network
Architectural designs for routers and networks of routers to support mobile communication are analysed for their end-to-end performance using a simple Markov model. In view of the...
Nalan Gülpinar, Peter G. Harrison, Berç...
ICIP
2003
IEEE
14 years 10 months ago
Techniques for automatic video content derivation
In this paper, we focus on the use of three different techniques that support automatic derivation of video content from raw video data, namely, a spatio-temporal rule-based metho...
Milan Petkovic, Vojkan Mihajlovic, Willem Jonker
DSN
2009
IEEE
13 years 6 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...