Sciweavers

6689 search results - page 114 / 1338
» A Network Security Monitor
Sort
View
IMC
2003
ACM
14 years 3 months ago
Tomography-based overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Randy H. Katz
IMC
2007
ACM
13 years 11 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
SSDBM
2008
IEEE
181views Database» more  SSDBM 2008»
14 years 4 months ago
Monitoring Aggregate k-NN Objects in Road Networks
Abstract. In recent years, there is an increasing need to monitor k nearest neighbor (k-NN) in a road network. There are existing solutions on either monitoring k-NN objects from a...
Lu Qin, Jeffrey Xu Yu, Bolin Ding, Yoshiharu Ishik...
PAM
2012
Springer
12 years 5 months ago
A Sequence-Oriented Stream Warehouse Paradigm for Network Monitoring Applications
Network administrators are faced with the increasingly challenging task of monitoring their network’s health in real time, drawing upon diverse and voluminous measurement data fe...
Lukasz Golab, Theodore Johnson, Subhabrata Sen, Je...
ESORICS
2009
Springer
14 years 10 months ago
Client-Side Detection of XSS Worms by Monitoring Payload Propagation
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites. To date, the detection of XSS worms has been...
Fangqi Sun, Liang Xu, Zhendong Su