Sciweavers

10077 search results - page 1933 / 2016
» Mobile Networking in the Internet
Sort
View
CCS
1994
ACM
14 years 2 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
14 years 2 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
GLOBECOM
2009
IEEE
14 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
COMPSAC
2004
IEEE
14 years 1 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
CAISE
2006
Springer
14 years 1 months ago
A Pattern for Designing Distributed Heterogeneous Ontologies for Facilitating Application Interoperability
The role of ontologies in knowledge base systems is gradually increasing. Along with the growth of Internet based applications and ecommerce, the need for easy interoperability bet...
M. Chenine, Vandana Kabilan, M. Garcia Lozano
« Prev « First page 1933 / 2016 Last » Next »