Sciweavers

363 search results - page 38 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 1 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
INFOCOM
1994
IEEE
13 years 11 months ago
Traffic Models for Wireless Communication Networks
In this paper, we introduce a deterministic fluid model and two stochastic traffic models for wireless networks. The setting is a highway with multiple entrances and exits. Vehicl...
Kin K. Leung, William A. Massey, Ward Whitt
VTC
2007
IEEE
103views Communications» more  VTC 2007»
14 years 1 months ago
On the Problems of Symbol-Spaced Tapped-Delay-Line Models for WSSUS Channels
—This paper reviews the pertinence and statistical behavior of symbol-spaced tapped-delay-line (TDL) models which are widely used to model wide-sense stationary uncorrelated scat...
Carlos A. Gutiérrez-Díaz-de-Le&oacut...
DSS
2007
231views more  DSS 2007»
13 years 7 months ago
Self-healing systems - survey and synthesis
As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becom...
Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambh...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman