-
1
-
-
50049106161
-
-
decision team of the Biometry and Artificial Intelligence Unit of INRA
-
decision team of the Biometry and Artificial Intelligence Unit of INRA. Matlab mdp toolbox:www.inra.fr/bia/t/mdptoolbox/.
-
Matlab mdp toolbox
-
-
-
2
-
-
50049119954
-
Fast payload-based flow estimation for traffic monitoring and network security
-
New York, NY, USA, ACM Press
-
Fang Hao, Murali Kodialam, T. V. Lakshman, and Hui Zhang. Fast payload-based flow estimation for traffic monitoring and network security. In ANCS '05: Proceedings of the 2005 symposium on Architecture for networking and communications systems, pages 211-220, New York, NY, USA, 2005. ACM Press.
-
(2005)
ANCS '05: Proceedings of the 2005 symposium on Architecture for networking and communications systems
, pp. 211-220
-
-
Hao, F.1
Murali Kodialam, T.V.L.2
Zhang, H.3
-
4
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
USENIX Security
-
Hyang-Ah Kim and Brad Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security. USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Kim, H.-A.1
Karp, B.2
-
5
-
-
1942532330
-
feedback control applied to survivability: A host-based autonomic defense system
-
March
-
O. Patrick Kreidl and Tiffany M. Frazier. "feedback control applied to survivability: A host-based autonomic defense system". IEEE TRANSACTIONS ON RELIABILITY, 53(1): 148-166, March 2004.
-
(2004)
IEEE TRANSACTIONS ON RELIABILITY
, vol.53
, Issue.1
, pp. 148-166
-
-
Patrick Kreidl, O.1
Frazier, T.M.2
-
6
-
-
50049130454
-
-
Tom Liston. Labrea. http://www.labreatechnologies.com.
-
Labrea
-
-
Liston, T.1
-
7
-
-
85043988965
-
Finding similar files in a large file system
-
Udi Manber. Finding similar files in a large file system. In USENIX Technical Conference, 1994.
-
(1994)
USENIX Technical Conference
-
-
Manber, U.1
-
9
-
-
0036036764
-
low-bandwidth network file system
-
A, Chateau Lake Louise, Banff, Canada, October
-
Athicha Muthitacharoen, Benjie Chen, and David Mazieres. A low-bandwidth network file system. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01), pages 174-187, Chateau Lake Louise, Banff, Canada, October 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP '01)
, pp. 174-187
-
-
Muthitacharoen, A.1
Chen, B.2
Mazieres, D.3
-
11
-
-
0003676885
-
Fingerprinting by random polynomials
-
Technical report, Center for Resaerch in Computing Technology, Harvard University
-
Michael O. Rabin. Fingerprinting by random polynomials. Technical report, Center for Resaerch in Computing Technology, Harvard University, 1981.
-
(1981)
-
-
Rabin, M.O.1
-
12
-
-
24644466576
-
An email worm vaccine architecture
-
Stelios Sidiroglou, John Ionnidis, Angelos D. Keromytis, and Salvatore J. Stolfo. An email worm vaccine architecture. In Proceedings of the First Information Security Practice and Experience Conference, LCNS 3439, pages 97-108, 2005.
-
(2005)
Proceedings of the First Information Security Practice and Experience Conference, LCNS 3439
, pp. 97-108
-
-
Sidiroglou, S.1
Ionnidis, J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
14
-
-
50049115564
-
-
M. Williamson. throttling viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL-2002-172, Information Infrastructure Laboratory, HP Laboratories Bristol, June 2002.
-
M. Williamson. "throttling viruses: Restricting propagation to defeat malicious mobile code". Technical Report HPL-2002-172, Information Infrastructure Laboratory, HP Laboratories Bristol, June 2002.
-
-
-
-
15
-
-
14944368398
-
worm propagation modeling and analysis under dynamic quarantine defense
-
Washington, DC, October
-
Cliff C. Zou, Weibo Gong, and Don Towsley. "worm propagation modeling and analysis under dynamic quarantine defense". In A CM CCS Workshop on Rapid Malcode (WORM'OS), Washington, DC, October 2003.
-
(2003)
A CM CCS Workshop on Rapid Malcode (WORM'OS)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
16
-
-
17444378633
-
-
Cliff C. Zou, Don Towsley, and Weibo Gong. Email worm modeling and defense. In In Proceedings of International Conference on Computer Communications and Nnetworks, 2004.
-
Cliff C. Zou, Don Towsley, and Weibo Gong. Email worm modeling and defense. In In Proceedings of International Conference on Computer Communications and Nnetworks, 2004.
-
-
-
|