Sciweavers

386 search results - page 35 / 78
» Modeling Intrusion Detection Systems Using Linear Genetic Pr...
Sort
View
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
14 years 24 days ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
ACSAC
2002
IEEE
14 years 1 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
RISE
2004
Springer
14 years 2 months ago
A Symbolic Model Checker for tccp Programs
In this paper, we develop a symbolic representation for timed concurrent constraint (tccp) programs, which can be used for defining a lightweight model–checking algorithm for re...
María Alpuente, Moreno Falaschi, Alicia Vil...
LPNMR
2001
Springer
14 years 1 months ago
Bounded LTL Model Checking with Stable Models
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. As the model of asynchronous syst...
Keijo Heljanko, Ilkka Niemelä
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
13 years 3 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...