Sciweavers

614 search results - page 39 / 123
» DE in Slovenia: Where are We
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
DSOM
2009
Springer
14 years 2 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
IVA
2009
Springer
14 years 2 months ago
Expression of Moral Emotions in Cooperating Agents
Moral emotions have been argued to play a central role in the emergence of cooperation in human-human interactions. This work describes an experiment which tests whether this insig...
Celso M. de Melo, Liang Zheng, Jonathan Gratch
ICAS
2008
IEEE
145views Robotics» more  ICAS 2008»
14 years 2 months ago
Task Dependency of User Perceived Utility in Autonomic VoIP Systems
The transmission of voice-over-Internet protocol (VoIP) network traffic is used in an increasing variety of applications and settings. Many of these applications involve communic...
Edward Stehle, Maxim Shevertalov, Paul deGrandis, ...
HASE
2007
IEEE
14 years 2 months ago
A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance
We adapt the classic cusum change-point detection algorithm for applications to data network monitoring where various and numerous performance and reliability metrics are availabl...
Qi Zhang, Carlos Rendón, Veronica Montes De...