Sciweavers

8177 search results - page 56 / 1636
» Detecting System Emulators
Sort
View
CCR
2006
118views more  CCR 2006»
13 years 9 months ago
Tmix: a tool for generating realistic TCP application workloads in ns-2
In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "look...
Michele C. Weigle, Prashanth Adurthi, Félix...
ISSA
2008
13 years 10 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
GLOBECOM
2008
IEEE
14 years 3 months ago
Opportunity Detection for OFDMA Systems with Timing Misalignment
— Accurate detection of spectrum opportunities within the frequency band of an orthogonal frequency division multiple access (OFDMA) system is a critical requirement for the real...
Mustafa E. Sahin, Ismail Güvenç, Moo-R...
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 11 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
CIS
2007
Springer
14 years 3 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang