Sciweavers

394 search results - page 16 / 79
» Game theoretic models for detecting network intrusions
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Distributed Cross-Layer Optimization of Wireless Sensor Networks: A Game Theoretic Approach
— This paper proposes a distributed optimization framework for wireless multihop sensor networks base on a game theoretic approach. We show that the cross-layer optimization prob...
Jun Yuan, Wei Yu
ATAL
2004
Springer
13 years 11 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
14 years 1 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
AINA
2006
IEEE
14 years 1 months ago
Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMs
Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But two important problems block the way to...
Ming Gao, Kenong Zhang, Jiahua Lu
KBSE
2005
IEEE
14 years 1 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer