Sciweavers

1318 search results - page 238 / 264
» Measuring network security using dynamic bayesian network
Sort
View
IAT
2006
IEEE
14 years 1 months ago
Autonomous Mobile Programs
To manage load on large and dynamic networks we have developed Autonomous Mobile Programs (AMPs) that periodically use a cost model to decide where to execute. A disadvantage of d...
Xiao Yan Deng, Philip W. Trinder, Greg Michaelson
IMC
2010
ACM
13 years 5 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
SEMWEB
2005
Springer
14 years 1 months ago
Modeling Degrees of Conceptual Overlap in Semantic Web Ontologies
Information retrieval systems have to deal with uncertain knowledge and query results should reflect this uncertainty in some manner. However, Semantic Web ontologies are based on...
Markus Holi, Eero Hyvönen
RAID
1999
Springer
13 years 12 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
SIGCOMM
2000
ACM
14 years 1 days ago
FIRE: Flexible intra-AS routing environment
Current routing protocols are monolithic, specifying the algorithm used to construct forwarding tables, the metric used by the algorithm (generally some form of hop-count), and th...
Craig Partridge, Alex C. Snoeren, W. Timothy Stray...