Sciweavers

1424 search results - page 76 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
CCS
2004
ACM
14 years 1 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
INFOCOM
2008
IEEE
14 years 2 months ago
Run-Time System for Scalable Network Services
Sophisticated middlebox services–such as network monitoring and intrusion detection, DDoS mitigation, worm scanning, XML parsing and protocol transformation–are becoming incre...
Upendra Shevade, Ravi Kokku, Harrick M. Vin
ESEM
2007
ACM
13 years 10 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
CORR
2011
Springer
241views Education» more  CORR 2011»
12 years 12 months ago
An Agent-based Strategy for Deploying Analysis Models into Specification and Design for Distributed APS Systems
Despite the extensive use of the agent technology in the Supply Chain Management field, its integration with Advanced Planning and Scheduling (APS) tools still represents a promis...
Luis Antonio de Santa-Eulalia, Sophie D'Amours, Je...
WWW
2007
ACM
14 years 8 months ago
Designing efficient sampling techniques to detect webpage updates
Due to resource constraints, Web archiving systems and search engines usually have difficulties keeping the entire local repository synchronized with the Web. We advance the state...
Qingzhao Tan, Ziming Zhuang, Prasenjit Mitra, C. L...