Sciweavers

786 search results - page 129 / 158
» Network Inference from Co-Occurrences
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
CN
2010
110views more  CN 2010»
13 years 7 months ago
End-to-end quality of service seen by applications: A statistical learning approach
The focus of this work is on the estimation of quality of service (QoS) parameters seen by an application. Our proposal is based on end-to-end active measurements and statistical ...
Pablo Belzarena, Laura Aspirot
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 7 months ago
Real-Time Multi-path Tracking of Probabilistic Available Bandwidth
Applications such as traffic engineering and network provisioning can greatly benefit from knowing, in real time, what is the largest input rate at which it is possible to transmit...
Frederic Thouin, Mark Coates, Michael Rabbat
CVPR
2003
IEEE
14 years 9 months ago
Tracking Appearances with Occlusions
Occlusion is a difficult problem for appearance-based target tracking, especially when we need to track multiple targets simultaneously and maintain the target identities during t...
Ying Wu, Ting Yu, Gang Hua
PLDI
2003
ACM
14 years 28 days ago
CCured in the real world
CCured is a program transformation system that adds memory safety guarantees to C programs by verifying statically that memory errors cannot occur and by inserting run-time checks...
Jeremy Condit, Matthew Harren, Scott McPeak, Georg...