2010 International Conference on Availability, Reliability and Security

15-18 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 132
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (850 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Welcome message from ARES 2010 Chairs

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (123 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from ARES 2010 Workshop Co-Chair

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • ARES 2010 Conference Officers

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • ARES 2010 Reviewer List

    Publication Year: 2010, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Welcome message from the FARES 2010 Workshop C0-Chairs

    Publication Year: 2010, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome message from the OSA 2010 Workshop Chair

    Publication Year: 2010, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • OSA 2010 Organizing Committee

    Publication Year: 2010, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • OSA 2010 Reviewer List

    Publication Year: 2010, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Welcome message from the SECSE 2010 Workshop Organizers

    Publication Year: 2010, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • SecSE 2010 Organization

    Publication Year: 2010, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Welcome message from the SPattern 2010 Workshop Organizers

    Publication Year: 2010, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB) | HTML iconHTML
    Freely Available from IEEE
  • SPattern 2010 Organization Committee

    Publication Year: 2010, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Welcome message from the WAIS 2010 Workshop Chair

    Publication Year: 2010, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • WAIS 2010 Organizing Committee

    Publication Year: 2010, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • WAIS 2010 reviewers

    Publication Year: 2010, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Welcome message from the WSDF 2010 Workshop Organizers

    Publication Year: 2010, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • WSDF 2010 Organizing Committee

    Publication Year: 2010, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • A Security Decision-Reaction Architecture for Heterogeneous Distributed Network

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    The main objective of this paper is to provide a global decision-reaction architectural built on the requirements for a reaction after alert detection mechanisms in the frame of information systems security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the architecture is elaborated using the multi-agents system that p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual-Level Attack Detection and Characterization for Networks under DDoS

    Publication Year: 2010, Page(s):9 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB) | HTML iconHTML

    DDoS attacks aim to deny legitimate users of the services. In this paper, we introduce novel dual - level attack detection (D-LAD) scheme for defending against the DDoS attacks. At higher and coarse level, the macroscopic level detectors (MaLAD) attempt to detect congestion inducing attacks which cause apparent slowdown in network functionality. The large volumes attacks are detected early at bord... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Effectiveness of Intrusion Detection by Correlation Feature Selection

    Publication Year: 2010, Page(s):17 - 24
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    The quality of the feature selection algorithm is one of the most important factors that affects the effectiveness of an intrusion detection system (IDS). Achieving reduction of the number of relevant traffic features without negative effect on classification accuracy is a goal that greatly improves the overall effectiveness of the IDS. Obtaining a good feature set automatically without involving ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.