Sciweavers

6689 search results - page 100 / 1338
» A Network Security Monitor
Sort
View
CCR
2008
122views more  CCR 2008»
13 years 9 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
NOSSDAV
1993
Springer
14 years 1 months ago
Queue Monitoring: A Delay Jitter Management Policy
: This paper describes queue monitoring, a policy for managing the effect of delay jitter on audio and video in computer-based conferences. By observing delay jitter over time, thi...
Donald L. Stone, Kevin Jeffay
CCS
2009
ACM
14 years 9 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
CCS
2008
ACM
13 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
BROADNETS
2007
IEEE
14 years 3 months ago
Monitoring and alarm management in transparent optical networks
—Rapid fault identification and localization in optical networks are crucial due to high data rates. These problems are more challenging than in traditional electronic networks ...
Sava Stanic, Gokhan Sahin, Hongsik Choi, Suresh Su...