Sciweavers

4 search results - page 1 / 1
» Detecting HTTP Tunnels with Statistical Mechanisms
Sort
View
ICC
2007
IEEE
122views Communications» more  ICC 2007»
14 years 5 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 5 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
CNSR
2009
IEEE
102views Communications» more  CNSR 2009»
14 years 2 months ago
Online Classification of Network Flows
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we prop...
Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani
BMCBI
2007
146views more  BMCBI 2007»
13 years 11 months ago
Bayesian hierarchical model for transcriptional module discovery by jointly modeling gene expression and ChIP-chip data
Background: Transcriptional modules (TM) consist of groups of co-regulated genes and transcription factors (TF) regulating their expression. Two high-throughput (HT) experimental ...
Xiangdong Liu, Walter J. Jessen, Siva Sivaganesan,...