Sciweavers

2269 search results - page 352 / 454
» Behavioral Intrusion Detection
Sort
View
NCA
2007
IEEE
14 years 4 months ago
A Topological Analysis of Monitor Placement
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
ICAS
2006
IEEE
207views Robotics» more  ICAS 2006»
14 years 4 months ago
Biologically-Inspired Design of Autonomous and Adaptive Grid Services
Abstract—This paper describes and evaluates a biologically-inspired network architecture that allows grid services to autonomously adapt to dynamic environment changes in the net...
Chonho Lee, Junichi Suzuki
ISSTA
2006
ACM
14 years 4 months ago
Architecture-driven platform independent deterministic replay for distributed hard real-time systems
Distributed hard real-time systems have become a major component of many advanced technical products. Means to ensure their proper quality are thus of paramount importance. To ens...
Holger Giese, Stefan Henkler
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
14 years 4 months ago
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
— It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance dif...
Antonio Di Stefano, Giovanni Terrazzino, Luca Scal...
APSEC
2005
IEEE
14 years 3 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier