Sciweavers

RAID
2000
Springer
14 years 7 days ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
RAID
2000
Springer
14 years 7 days ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
Joachim Biskup, Ulrich Flegel
NDSS
2000
IEEE
14 years 7 days ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
MOBIHOC
2000
ACM
14 years 7 days ago
An architecture for building self-configurable systems
AbstractDeveloping wireless sensor networks can enable information gathering, information processing and reliable monitoring of a variety of environments for both civil and militar...
Lakshminarayanan Subramanian, Randy H. Katz
LCN
2000
IEEE
14 years 7 days ago
Practical Traffic Grooming Scheme for Single-Hub SONET/WDM Rings
Xiang-Yang Li, Liwu Liu, Peng-Jun Wan, Ophir Fried...
LCN
2000
IEEE
14 years 7 days ago
Efficient Congestion Avoidance Mechanism
The nowadays Internet architecture is mainly based on unicast communications and best-effort service. However, the development of the Internet encouraged emerging services that ar...
Anca Dracinschi Sailer, Serge Fdida
LCN
2000
IEEE
14 years 7 days ago
Load-Balanced Routing and Scheduling for Real-Time Traffic in Packet-Switch Networks
Future computer networks are expected to carry bursty real-time traffic with stringent time-delay requirements. Popular shortest-path routing protocols have the disadvantage of ca...
Sangman Bak, Albert Mo Kim Cheng, Jorge Arturo Cob...
WAN
1998
Springer
14 years 7 days ago
Performance Analysis of Wavefront Algorithms on Very-Large Scale Distributed Systems
We present a model for the parallel performance of algorithms that consist of concurrent, two-dimensional wavefronts implemented in a message passing environment. The model combine...
Adolfy Hoisie, Olaf M. Lubeck, Harvey J. Wasserman
IWAN
2000
Springer
14 years 7 days ago
The Active Process Interaction with Its Environment
Adding programmability to the interior of the network provides an infrastructure for distributed applications. Speci
Jessica A. Kornblum, Danny Raz, Yuval Shavitt