Sciweavers

1012 search results - page 141 / 203
» A Framework for Rule Processing in Reconfigurable Network Sy...
Sort
View
154
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
142
Voted
CIT
2004
Springer
15 years 10 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
GIS
2010
ACM
15 years 2 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
170
Voted
ISCAS
2005
IEEE
146views Hardware» more  ISCAS 2005»
15 years 10 months ago
A novel approach for network on chip emulation
— Current Systems-On-Chip execute applications that demand extensive parallel processing. Networks-On-Chip (NoC) provide a structured way of realizing interconnections on silicon...
Nicolas Genko, David Atienza, Giovanni De Micheli,...
155
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 5 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin