Sciweavers

6689 search results - page 104 / 1338
» A Network Security Monitor
Sort
View
NETWORK
2010
92views more  NETWORK 2010»
13 years 3 months ago
On the use of RTP for monitoring and fault isolation in IPTV
Since the first operational IPTV networks have been deployed, service providers and operators have struggled to make their subscribers happy and satisfied with their services. To ...
Ali C. Begen, Colin Perkins, Jörg Ott
ACSAC
2005
IEEE
14 years 2 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
ICCCN
2008
IEEE
14 years 3 months ago
p-Percent Coverage Schedule in Wireless Sensor Networks
—We investigate the p-percent coverage problem in this paper and propose two algorithms to prolong network lifetime based on the fact that for some applications full coverage is ...
Shan Gao, Xiaoming Wang, Yingshu Li
ACSAC
2009
IEEE
14 years 3 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
ACSAC
2010
IEEE
13 years 18 days ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo