Sciweavers

305 search results - page 11 / 61
» Set Algebra for Service Behavior: Applications and Construct...
Sort
View
ACSAC
2003
IEEE
14 years 26 days ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
ESOP
1990
Springer
13 years 11 months ago
Algebraic Properties of Program Integration
The need to integrate several versions of a program into a common one arises frequently, but it is a tedious and time consuming task to merge programs by hand. The program-integrat...
Thomas W. Reps
JSW
2007
191views more  JSW 2007»
13 years 7 months ago
Building Self-Configuring Data Centers with Cross Layer Coevolution
Abstract—This paper describes a biologically-inspired architecture, called SymbioticSphere, which allows data centers to autonomously adapt to dynamic environmental changes. Symb...
Paskorn Champrasert, Junichi Suzuki
INFOCOM
2011
IEEE
12 years 11 months ago
Network-aware behavior clustering of Internet end hosts
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Kuai Xu, Feng Wang 0002, Lin Gu
TON
2008
102views more  TON 2008»
13 years 7 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya