Results 381-400 of 407.
![]() Schleich, Julien ![]() ![]() ![]() in MOBIWAC - International Symposium on Mobility Management and Wireless Access (2009) This paper introduces Blackbone2, a novel fully decentralized algorithm that aims at creating a robust backbone in ad hoc networks. Backbone robustness is supported by a 2-Connected $m$-dominating Set, $2 ... [more ▼] This paper introduces Blackbone2, a novel fully decentralized algorithm that aims at creating a robust backbone in ad hoc networks. Backbone robustness is supported by a 2-Connected $m$-dominating Set, $2,m$-CDS, and decentralization relies on the usage of two rules that only require two-hop knowledge in order to reduce the use of bandwidth. Blackbone2 deterministic approach guarantees a density-independent valid solution and is proved correct. The algorithm is also characterized by its efficient theoretical computation time, $\mathcal{O}(\Delta^{2})$ with $\Delta$ the average number of neighbors, which outperforms known solutions. The domination parameter, $m$, can be increased without changing the theoretical computation time. Efficiency of the Blackbone2 algorithm compared to the equivalent literature solutions is illustrated through simulations of a large panel of networks with a wide density range. [less ▲] Detailed reference viewed: 189 (16 UL)![]() Dorronsoro, Bernabé ![]() ![]() ![]() in Abstract book of 2009 IEEE Congress on Evolutionary Computation (2009) Detailed reference viewed: 280 (16 UL)![]() Dorronsoro, Bernabé ![]() ![]() ![]() in Proceedings of national Conference on Metaheuristicas, Algoritmos Evolutivos y Bioinspirados(MAEB'09) (2009) Detailed reference viewed: 226 (9 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in Journal of Interconnection Networks (2008), 9(3), 277297 Detailed reference viewed: 137 (5 UL)![]() ![]() Ostaszewski, Marek ![]() ![]() in IEEE World Congress on Computational Intelligence, WCCI 2008, Congress on Evolutionary Computation CEC 2008, Honk-Kong, June (2008) In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like ... [more ▼] In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS is evaluated on the MITpsila99 dataset and outperforms previous approaches for DoS detection applied to this set. [less ▲] Detailed reference viewed: 143 (0 UL)![]() Ostaszewski, Marek ![]() ![]() in The 21th IEEE International Parallel and Distributed Processing Symposium (IPDPS), NIDISC Workshop. (2008) In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like ... [more ▼] In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS is evaluated on the MIT'99 dataset and outperforms previous approaches for DoS detection applied to this set. [less ▲] Detailed reference viewed: 165 (0 UL)![]() ![]() Varrette, Sébastien ![]() ![]() ![]() in International Conference on Metaheuristics and Nature Inspired Computing (META'08) (2008) Detailed reference viewed: 101 (0 UL)![]() ![]() Dunlop, Dominic ![]() ![]() ![]() in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'08) (2008) Detailed reference viewed: 136 (0 UL)![]() ![]() Hogie, Luc ![]() ![]() ![]() in Second International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences (MCO 2008) (2008) Detailed reference viewed: 130 (5 UL)![]() ![]() Dorronsoro, Bernabé ![]() ![]() ![]() in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS008) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008). (2008) Detailed reference viewed: 100 (5 UL)![]() Ruiz, Patricia ![]() ![]() in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS'08) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008) (2008) Detailed reference viewed: 314 (7 UL)![]() Ostaszewski, Marek ![]() ![]() in Journal of Mathematical Modelling and Algorithms (2007), 6(3), 411-431 The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a ... [more ▼] The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a model of the network behavior based on the self-nonself space paradigm. Covering both self and nonself spaces by hyperrectangular structures is proposed. The structures corresponding to self-space are built using a training set from this space. The hyperrectangular detectors covering nonself space are created using a niching genetic algorithm. A coevolutionary algorithm is proposed to enhance this process. The results of experiments show a high quality of intrusion detection, which outperform the quality of the recently proposed approach based on a hypersphere representation of the self-space. [less ▲] Detailed reference viewed: 160 (2 UL)![]() ![]() Danoy, Grégoire ![]() ![]() ![]() in Congress on Evolutionary Computation (CEC) (2007) Detailed reference viewed: 131 (6 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in The 21st European Conference on Modeling and Simulation (ECMS 2007) (2007) Detailed reference viewed: 74 (9 UL)![]() ![]() Danoy, Grégoire ![]() ![]() ![]() in 9th annual conference on Genetic and evolutionary computation (GECCO '07) (2007) Detailed reference viewed: 131 (3 UL)![]() ![]() Bouvry, Pascal ![]() in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006) Detailed reference viewed: 108 (0 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in ANNIE 2006: Proceedings of the 16th international conference on Artificial Neural Networks In Engineering (2006) Detailed reference viewed: 102 (6 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in HIS'06: Proceedings of the 6th international conference on Hybrid Intelligent Systems (2006) Detailed reference viewed: 148 (6 UL)![]() Bernard, Nicolas ![]() ![]() in Leprévost, Franck; Ebrahimi, Touradj; Warusfel, Bertrand (Eds.) Cryptographie et sécurité de systèmes et réseaux (2006) Detailed reference viewed: 130 (5 UL)![]() ![]() Hogie, Luc ![]() ![]() in 9th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'06) (2006) Detailed reference viewed: 109 (3 UL) |
||