Sciweavers

394 search results - page 65 / 79
» Game theoretic models for detecting network intrusions
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
AINA
2007
IEEE
14 years 1 months ago
Trust Enhanced Secure Mobile Ad-Hoc Network Routing
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
Venkatesan Balakrishnan, Vijay Varadharajan, Phill...
ICNS
2009
IEEE
14 years 2 months ago
Psychometric and Evidentiary Approaches to Simulation Assessment in Packet Tracer Software
Packet Tracer is a comprehensive instructional software application for teaching skills and concepts associated with computer networking. In addition to a wide range of simulation...
Dennis C. Frezzo, John T. Behrens, Robert J. Misle...
PRICAI
2000
Springer
13 years 11 months ago
Trading Off Granularity against Complexity
The automated prediction of a user's interests and requirements is an area of interest to the Artificial Intelligence community. However, current predictive statistical approa...
Ingrid Zukerman, David W. Albrecht, Ann E. Nichols...
ANCS
2005
ACM
14 years 1 months ago
Fast and scalable pattern matching for content filtering
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packe...
Sarang Dharmapurikar, John W. Lockwood