Sciweavers

2645 search results - page 446 / 529
» Autonomous security for autonomous systems
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
158
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ICDE
2007
IEEE
152views Database» more  ICDE 2007»
15 years 10 months ago
Automatically Identifying Known Software Problems
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated dia...
Natwar Modani, Rajeev Gupta, Guy M. Lohman, Tanvee...
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
15 years 10 months ago
Ranking Issues for Information Integration
Ranking of query/search answers, although introduced by early information retrieval systems, has become mandatory for internet searches. When the answers of a query or search are ...
Aditya Telang, Roochi Mishra, Sharma Chakravarthy
123
Voted
ICNP
2007
IEEE
15 years 10 months ago
Lexicographic products in metarouting
— Routing protocols often keep track of multiple route metrics, where some metrics are more important than others. Route selection is then based on lexicographic comparison: the ...
Alexander J. T. Gurney, Timothy G. Griffin