Abstract— Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. This proc...
Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franz...
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barrier...
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...
Dynamic spectrum access is a maturing technology that allows next generation wireless devices to make highly efficient use of wireless spectrum. Spectrum can be allocated on an o...
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher ...