GridBox: securing hosts from malicious and greedy applications.
Evgueni DodonovJoelle Quaini SousaHélio Crestana GuardiaPublished in: Middleware for Grid Computing (2004)
Keyphrases
- greedy algorithm
- search algorithm
- network traffic
- ip addresses
- mobile agents
- locally optimal
- greedy heuristic
- marginal utility
- malicious behavior
- malicious code
- dynamic programming
- multiscale
- greedy strategy
- feature selection
- learning algorithm
- forward selection
- active learning
- databases
- stochastic search
- case study
- malicious attacks
- malicious users
- detect malicious
- data mining