Sciweavers

2269 search results - page 317 / 454
» Behavioral Intrusion Detection
Sort
View
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
14 years 4 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
AAAI
1998
13 years 11 months ago
What Is Wrong With Us? Improving Robustness Through Social Diagnosis
1 Robust behavior in complex, dynamic environments mandates that intelligent agents autonomously monitor their own run-time behavior, detect and diagnose failures, and attempt reco...
Gal A. Kaminka, Milind Tambe
SAS
2012
Springer
208views Formal Methods» more  SAS 2012»
12 years 17 days ago
Finding Non-terminating Executions in Distributed Asynchronous Programs
Programming distributed and reactive asynchronous systems is complex due to the lack of synchronization between concurrently executing tasks, and arbitrary delay of message-based c...
Michael Emmi, Akash Lal
OSDI
2004
ACM
14 years 10 months ago
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. We observe that wide-area services, such as peerto-peer systems an...
Ming Zhang, Chi Zhang, Vivek S. Pai, Larry L. Pete...
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 11 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel