Sciweavers

765 search results - page 145 / 153
» Detecting Anomalies and Intruders
Sort
View
CNSM
2010
13 years 2 months ago
Semantic scheduling of active measurements for meeting network monitoring objectives
Network control and management techniques (e.g., dynamic path switching, on-demand bandwidth provisioning) rely on active measurements of end-to-end network status. These measureme...
Prasad Calyam, Lakshmi Kumarasamy, Füsun &Oum...
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
SIGOPS
2010
105views more  SIGOPS 2010»
13 years 2 months ago
SelfTalk for Dena: query language and runtime support for evaluating system behavior
We introduce SelfTalk, a novel declarative language that allows users to query and understand the status of a large scale system. SelfTalk is sufficiently expressive to encode an ...
Saeed Ghanbari, Gokul Soundararajan, Cristiana Amz...
AAAI
2006
13 years 8 months ago
Maintaining Cooperation in Noisy Environments
To prevent or alleviate conflicts in multi-agent environments, it is important to distinguish between situations where another agent has misbehaved intentionally and situations wh...
Tsz-Chiu Au, Dana S. Nau
SIGCOMM
2010
ACM
13 years 7 months ago
Crowdsourcing service-level network event monitoring
The user experience for networked applications is becoming a key benchmark for customers and network providers. Perceived user experience is largely determined by the frequency, d...
David R. Choffnes, Fabián E. Bustamante, Zi...