Sciweavers

255 search results - page 28 / 51
» Timing Anomalies Reloaded
Sort
View
ICDCS
2003
IEEE
14 years 3 months ago
Experiences With Monitoring OSPF on a Regional Service Provider Network
This paper presents the results from a detailed, experimental study of OSPF, an intra-domain routing protocol, running on a mid-size regional Internet service provider. Using mult...
David Watson, Farnam Jahanian, Craig Labovitz
SIGCOMM
1997
ACM
14 years 2 months ago
Internet Routing Instability
Abstract—This paper examines the network interdomain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet ...
Craig Labovitz, G. Robert Malan, Farnam Jahanian
DMIN
2006
157views Data Mining» more  DMIN 2006»
13 years 11 months ago
Data Mining of Air Traffic Control Operational Errors
In this paper we present the results of applying data mining techniques to identify patterns and anomalies in air traffic control operational errors (OEs). Reducing the OE rate is ...
Zohreh Nazeri
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 10 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...