Sciweavers

1804 search results - page 72 / 361
» Measuring denial Of service
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 7 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
14 years 4 months ago
Quantifying IT Value Latency: The Case of the Financial Services Industry
Both the academia and practice recognize that information technology (IT) investments may not yield immediate benefits. Nevertheless, there has been a lack of methodological devel...
Kim Huat Goh, Robert J. Kauffman
WWW
2007
ACM
14 years 10 months ago
Monitoring the evolution of cached content in Google and MSN
In this paper, we describe a capture-recapture experiment conducted on Google's and MSN's cached directories. The anticipated outcome of this work was to monitor evoluti...
Ioannis Anagnostopoulos
TSE
2010
156views more  TSE 2010»
13 years 7 months ago
Discovering Services during Service-Based System Design Using UML
—Recently, there has been a proliferation of service-based systems, i.e. software systems that are composed of autonomous services, but can also use software code. In order to su...
George Spanoudakis, Andrea Zisman
KDD
2005
ACM
181views Data Mining» more  KDD 2005»
14 years 9 months ago
Evaluating similarity measures: a large-scale study in the orkut social network
Online information services have grown too large for users to navigate without the help of automated tools such as collaborative filtering, which makes recommendations to users ba...
Ellen Spertus, Mehran Sahami, Orkut Buyukkokten