Sciweavers

168 search results - page 23 / 34
» Efficiently Detecting Inclusion Dependencies
Sort
View
ACSAC
2004
IEEE
14 years 4 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
PAMI
2006
193views more  PAMI 2006»
13 years 8 months ago
A System for Learning Statistical Motion Patterns
Analysis of motion patterns is an effective approach for anomaly detection and behavior prediction. Current approaches for the analysis of motion patterns depend on known scenes, w...
Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tien...
ENGL
2006
204views more  ENGL 2006»
13 years 8 months ago
The Communication in Intelligent Distributed Fault Tolerant Systems
Intelligent Agents have originated a lot of discussion about what they are, and how they are different from general programs. We describe in this paper a new paradigm for intellige...
Arnulfo Alanis Garza, Juan José Serrano, Ra...
CORR
2004
Springer
119views Education» more  CORR 2004»
13 years 8 months ago
Exploring networks with traceroute-like probes: theory and simulations
Mapping the Internet generally consists in sampling the network from a limited set of sources by using traceroute-like probes. This methodology, akin to the merging of different s...
Luca Dall'Asta, J. Ignacio Alvarez-Hamelin, Alain ...
EC
2006
195views ECommerce» more  EC 2006»
13 years 8 months ago
Automated Global Structure Extraction for Effective Local Building Block Processing in XCS
Learning Classifier Systems (LCSs), such as the accuracy-based XCS, evolve distributed problem solutions represented by a population of rules. During evolution, features are speci...
Martin V. Butz, Martin Pelikan, Xavier Llorà...