Sciweavers

17409 search results - page 3465 / 3482
» Oblio: Design and Performance
Sort
View
ATAL
2003
Springer
14 years 3 months ago
A prototype infrastructure for distributed robot-agent-person teams
Effective coordination of robots, agents and people promises to improve the safety, robustness and quality with which shared goals are achieved by harnessing the highly heterogene...
Paul Scerri, David V. Pynadath, W. Lewis Johnson, ...
AUSAI
2003
Springer
14 years 3 months ago
Choosing Learning Algorithms Using Sign Tests with High Replicability
An important task in machine learning is determining which learning algorithm works best for a given data set. When the amount of data is small the same data needs to be used repea...
Remco R. Bouckaert
CCS
2003
ACM
14 years 3 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
CCS
2003
ACM
14 years 3 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
« Prev « First page 3465 / 3482 Last » Next »