Sciweavers

394 search results - page 58 / 79
» Game theoretic models for detecting network intrusions
Sort
View
PKDD
2009
Springer
113views Data Mining» more  PKDD 2009»
14 years 2 months ago
Feature Selection for Density Level-Sets
A frequent problem in density level-set estimation is the choice of the right features that give rise to compact and concise representations of the observed data. We present an eļ¬...
Marius Kloft, Shinichi Nakajima, Ulf Brefeld
CCR
2006
117views more  CCR 2006»
13 years 7 months ago
Efficient and decentralized computation of approximate global state
Abstract-- The need for efficient computation of approximate global state lies at the heart of a wide range of problems in distributed systems. Examples include routing in the Inte...
S. Keshav
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
14 years 2 months ago
Doing Good with Spam Is Hard
We study economic means to improve network performance in the well-known game theoretic traļ¬ƒc model due to Wardrop. We introduce two sorts of spam ļ¬‚ow - auxiliary and adversari...
Martin Hoefer, Lars Olbrich, Alexander Skopalik
INFOCOM
2010
IEEE
13 years 6 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
DSN
2011
IEEE
12 years 7 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
ā€”Virtual coordinate systems provide an accurate and efļ¬cient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...