Sciweavers

35419 search results - page 107 / 7084
» How are we doing
Sort
View
124
Voted
COMPSAC
2008
IEEE
15 years 10 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
138
Voted
ICCCN
2008
IEEE
15 years 10 months ago
A Power-Preserving Broadcast Protocol for WSNs with DoS Resistance
—Broadcast presents a special challenge for Wireless Sensor Networks (WSNs). In some situation such as time synchronization or building routing path, broadcasting messages must b...
Chien-Chun Ni, Tien-Ruey Hsiang, J. D. Tygar
139
Voted
ICDCS
2006
IEEE
15 years 9 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
106
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Do Maintainers Utilize Deployed Design Patterns Effectively?
One claimed benefit of deploying design patterns is facilitating maintainers to perform anticipated changes. However, it is not at all obvious that the relevant design patterns de...
T. H. Ng, S. C. Cheung, W. K. Chan, Y. T. Yu
147
Voted
SIGIR
2002
ACM
15 years 3 months ago
Do TREC web collections look like the web?
We measure the WT10g test collection, used in the TREC-9 and TREC 2001 Web Tracks, and the .GOV test collection used in the TREC 2002 Web and Interactive Tracks, with common measu...
Ian Soboroff