Sciweavers

348 search results - page 16 / 70
» Offline firewall analysis
Sort
View
CN
2000
95views more  CN 2000»
13 years 9 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
INFOCOM
2006
IEEE
14 years 3 months ago
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN...
Salman Baset, Henning Schulzrinne
ICDAR
2009
IEEE
14 years 4 months ago
Arabic Handwriting Recognition Using Restored Stroke Chronology
In this paper we present a system of the off-line handwriting recognition. Our recognition system is based on temporal order restoration of the off-line trajectory. For this task ...
Abdelkarim Elbaati, Houcine Boubaker, Monji Kheral...
IJISEC
2008
188views more  IJISEC 2008»
13 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
ICDAR
2009
IEEE
14 years 4 months ago
New Algorithm of Straight or Curved Baseline Detection for Short Arabic Handwritten Writing
In this paper we present a new method of baseline detection of online or offline short handwriting. This work is part of a large project for the edification of a dual online / off...
Houcine Boubaker, Monji Kherallah, Adel M. Alimi