-
1
-
-
84904310464
-
Firewall policy advisor for anomaly detection and rule editing
-
March
-
E. Al-Shaer, H. Hamed, Firewall policy advisor for anomaly detection and rule editing, in: Proc. IEEE/IFIP 8th Int. Symp. Integrated Network Management, IM 2003, March 2003, pp. 17-30
-
(2003)
Proc. IEEE/IFIP 8th Int. Symp. Integrated Network Management, IM 2003
, pp. 17-30
-
-
Al-Shaer, E.1
Hamed, H.2
-
4
-
-
15544363043
-
Principle components and importance ranking of distributed anomalies
-
K. Begnum, and M. Burgess Principle components and importance ranking of distributed anomalies Machine Learning Journal 58 2005 217 230
-
(2005)
Machine Learning Journal
, vol.58
, pp. 217-230
-
-
Begnum, K.1
Burgess, M.2
-
7
-
-
0029311990
-
A site configuration engine
-
MIT Press Cambridge, MA
-
M. Burgess A site configuration engine Computing Systems vol. 8 1995 MIT Press Cambridge, MA 309
-
(1995)
Computing Systems
, vol.8
, pp. 309
-
-
Burgess, M.1
-
9
-
-
0032294044
-
Automated system administration with feedback regulation
-
M. Burgess Automated system administration with feedback regulation Software Practice and Experience 28 1998 1519
-
(1998)
Software Practice and Experience
, vol.28
, pp. 1519
-
-
Burgess, M.1
-
10
-
-
0442283022
-
The kinematics of distributed computer transactions
-
M. Burgess The kinematics of distributed computer transactions International Journal of Modern Physics, C 12 2000 759 789
-
(2000)
International Journal of Modern Physics, C
, vol.12
, pp. 759-789
-
-
Burgess, M.1
-
17
-
-
0003042004
-
Ponder: A language for specifying security and management policies for distributed systems
-
N. Damianou, N. Dulay, E.C. Lupu, M. Sloman, Ponder: a language for specifying security and management policies for distributed systems, Imperial College Research Report DoC 2000/1, 2000
-
(2000)
Imperial College Research Report
, vol.DOC 2000-1
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.C.3
Sloman, M.4
-
20
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
P. D'haeseleer, S. Forrest, P. Helman, An immunological approach to change detection: algorithms, analysis, and implications, in: Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, 1996
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
21
-
-
84959058425
-
Optimizing quality of service using fuzzy control
-
Y. Diao, J.L. Hellerstein, S. Parekh, Optimizing quality of service using fuzzy control, in: IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management, DSOM 2002, 2002, p. 42
-
(2002)
IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management, DSOM 2002
, pp. 42
-
-
Diao, Y.1
Hellerstein, J.L.2
Parekh, S.3
-
28
-
-
84959060669
-
The architecture of ng-mon: A passive network monitoring system for high-speed ip networks
-
S.-H. Han, M.-S. Kim, H.-T. Ju, J.W.-K. Hong, The architecture of ng-mon: A passive network monitoring system for high-speed ip networks, in: IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management, DSOM 2002, 2002, p. 16
-
(2002)
IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management, DSOM 2002
, pp. 16
-
-
Han, S.-H.1
Kim, M.-S.2
Ju, H.-T.3
Hong, J.W.-K.4
-
30
-
-
85084164220
-
Computer system performance problem detection using time series models
-
USENIX Association Berkeley, CA
-
P. Hoogenboom, and J. Lepreau Computer system performance problem detection using time series models Proceedings of the USENIX Technical Conference 1993 USENIX Association Berkeley, CA 15
-
(1993)
Proceedings of the USENIX Technical Conference
, pp. 15
-
-
Hoogenboom, P.1
Lepreau, J.2
-
38
-
-
0028201732
-
Tolerance, danger and the extended family
-
P. Matzinger Tolerance, danger and the extended family Annual Review Immunology 12 1994 991
-
(1994)
Annual Review Immunology
, vol.12
, pp. 991
-
-
Matzinger, P.1
-
41
-
-
0032141693
-
A formal theory for optimal and information theoretic syntactic pattern recognition
-
B.J. Oommen, and R.L. Kashyap A formal theory for optimal and information theoretic syntactic pattern recognition Patter Recognition 31 1998 1159
-
(1998)
Patter Recognition
, vol.31
, pp. 1159
-
-
Oommen, B.J.1
Kashyap, R.L.2
-
42
-
-
85084164413
-
Bro: A system for detecting network intruders in real time
-
USENIX Association Berkeley, CA
-
V. Paxson Bro: A system for detecting network intruders in real time Proceedings of the 7th Security Symposium 1998 USENIX Association Berkeley, CA
-
(1998)
Proceedings of the 7th Security Symposium
-
-
Paxson, V.1
-
43
-
-
0029323403
-
Wide area traffic: The failure of Poisson modelling
-
V. Paxson, and S. Floyd Wide area traffic: the failure of Poisson modelling IEEE/ACM Transactions on Networking 3 3 1995 226
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226
-
-
Paxson, V.1
Floyd, S.2
-
49
-
-
0003232762
-
Levy processes and infinitely divisible distributions
-
Cambridge
-
K.I. Sato, Levy Processes and Infinitely Divisible Distributions, in: Cambridge Studies in Advanced Mathematics, Cambridge, 1999
-
(1999)
Cambridge Studies in Advanced Mathematics
-
-
Sato, K.I.1
-
56
-
-
84959043682
-
Distributed fault localization in hierarchically routed networks
-
M. Steinder, A. Sethi, Distributed fault localization in hierarchically routed networks, in: IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management, DSOM 2002, 2002, p. 195
-
(2002)
IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management, DSOM 2002
, pp. 195
-
-
Steinder, M.1
Sethi, A.2
-
57
-
-
4444380999
-
A survey of fault localization techniques in computer networks
-
M. Steinder, and A. Sethi A survey of fault localization techniques in computer networks Science of Computer Programming 53 2003 165
-
(2003)
Science of Computer Programming
, vol.53
, pp. 165
-
-
Steinder, M.1
Sethi, A.2
|