Sciweavers

459 search results - page 66 / 92
» Detecting Spam at the Network Level
Sort
View
TON
2010
119views more  TON 2010»
13 years 7 months ago
Thwarting zero-day polymorphic worms with network-level length-based signature generation
—It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase...
Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li
DSN
2002
IEEE
14 years 1 months ago
Experimental Evaluation of Time-redundant Execution for a Brake-by-wire Application
This paper presents an experimental evaluation of a brake-by-wire application that tolerates transient faults by temporal error masking. A specially designed real-time kernel that...
Joakim Aidemark, Jonny Vinter, Peter Folkesson, Jo...
SIGCOMM
2000
ACM
14 years 1 months ago
Endpoint admission control: Architectural issues and performance
The traditional approach to implementing admission control, as exemplified by the Integrated Services proposal in the IETF, uses a signalling protocol to establish reservations a...
Lee Breslau, Edward W. Knightly, Scott Shenker, Io...

Publication
237views
12 years 10 months ago
Estimation of behavioral user state based on eye gaze and head pose—application in an e-learning environment
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...
Stylianos Asteriadis, Paraskevi Tzouveli, Kostas K...
RAID
1999
Springer
14 years 1 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li