Sciweavers

282 search results - page 51 / 57
» Monitoring Network Traffic to Detect Stepping-Stone Intrusio...
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 3 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
VIZSEC
2005
Springer
14 years 2 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
TSP
2010
13 years 3 months ago
Distributed detection of multi-hop information flows with fusion capacity constraints
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
Ameya Agaskar, Ting He, Lang Tong
FGCN
2008
IEEE
144views Communications» more  FGCN 2008»
14 years 3 months ago
A Novel Approach for Infrastructure Deployment for VANET
In last decade intelligent transportation systems (ITS) and vehicular ad hoc network (VANET) became one of the most active and emerging fields of research. It is expected that thi...
Une Thoing Rosi, Chowdhury Sayeed Hyder, Tai-hoon ...
TELSYS
2008
114views more  TELSYS 2008»
13 years 8 months ago
Efficient probe selection algorithms for fault diagnosis
Increase in the network usage for more and more performance critical applications has caused a demand for tools that can monitor network health with minimum management traffic. Ada...
Maitreya Natu, Adarshpal S. Sethi, Errol L. Lloyd