Sciweavers

1291 search results - page 82 / 259
» Intrusion Detection for Distributed Applications
Sort
View
WACV
2005
IEEE
14 years 5 months ago
Detecting Motion Patterns via Direction Maps with Application to Surveillance
To facilitate accurate and efficient detection of motion patterns in video data, it is desirable to abstract from pixel intensity values to representations that explicitly and co...
Jacob M. Gryn, Richard P. Wildes, John K. Tsotsos
ISSRE
2003
IEEE
14 years 2 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
IPPS
2008
IEEE
14 years 4 months ago
A modeling approach for estimating execution time of long-running scientific applications
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...
INFOCOM
2006
IEEE
14 years 3 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
CCS
2007
ACM
14 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...