Sciweavers

394 search results - page 63 / 79
» Game theoretic models for detecting network intrusions
Sort
View
IAJIT
2010
102views more  IAJIT 2010»
13 years 6 months ago
Multilayer neural network-burg combination for acoustical detection of buried objects
: A Burg technique is employed to model the long wavelength localization and imaging problem. A Burg method is used as a high resolution and stable technique. The idea of in-line h...
Mujahid Al-Azzo, Lubna Badri
SECON
2008
IEEE
14 years 2 months ago
Analytical Study of Collaborative Information Coverage for Object Detection in Sensor Networks
—Many sensor networks are deployed for the purpose of covering and monitoring a particular region, and detecting the object of interest in the region. In this paper, based on the...
Guanqun Yang, Vinod Shukla, Daji Qiao
IISWC
2008
IEEE
14 years 2 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
PIMRC
2008
IEEE
14 years 2 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
IFIP
2003
Springer
14 years 24 days ago
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case
In multi-hop wireless networks, every node is expected to forward packets for the benefit of other nodes. Yet, if each node is its own authority, then it may selfishly deny packe...
Márk Félegyházi, Levente Butt...