Sciweavers

87 search results - page 9 / 18
» The Use of Honeynets to Detect Exploited Systems Across Larg...
Sort
View
USENIX
2008
13 years 10 months ago
Wide-Scale Data Stream Management
This paper describes Mortar, a distributed stream processing platform for building very large queries across federated systems (enterprises, grids, datacenters, testbeds). Nodes i...
Dionysios Logothetis, Ken Yocum
IPPS
2007
IEEE
14 years 1 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
IPCCC
2006
IEEE
14 years 1 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
DEXA
2009
Springer
166views Database» more  DEXA 2009»
14 years 2 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
TIT
2002
95views more  TIT 2002»
13 years 7 months ago
Opportunistic beamforming using dumb antennas
Multiuser diversity is a form of diversity inherent in a wireless network, provided by independent time-varying channels across the different users. The diversity benefit is exploi...
Pramod Viswanath, David N. C. Tse, Rajiv Laroia