Sciweavers

2269 search results - page 374 / 454
» Behavioral Intrusion Detection
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
KBSE
2008
IEEE
14 years 4 months ago
Reducing the Cost of Path Property Monitoring Through Sampling
Run-time monitoring can provide important insights about a program’s behavior and, for simple properties, it can be done efficiently. Monitoring properties describing sequences...
Matthew B. Dwyer, Madeline Diep, Sebastian G. Elba...
CIRA
2007
IEEE
274views Robotics» more  CIRA 2007»
14 years 4 months ago
Adaptive Object Tracking using Particle Swarm Optimization
—This paper presents an automatic object detection and tracking algorithm by using particle swarm optimization (PSO) based method, which is a searching algorithm inspired by the ...
Yuhua Zheng, Yan Meng
DSN
2007
IEEE
14 years 4 months ago
On the Quality of Service of Crash-Recovery Failure Detectors
In this paper, we study and model a crash-recovery target and its failure detector’s probabilistic behavior. We extend Quality of Service (QoS) metrics to measure the recovery d...
Tiejun Ma, Jane Hillston, Stuart Anderson
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 4 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang