Sciweavers

6689 search results - page 159 / 1338
» A Network Security Monitor
Sort
View
CCS
2009
ACM
14 years 5 months ago
Battle of Botcraft: fighting bots in online games with human observational proofs
The abuse of online games by automated programs, known as game bots, for gaining unfair advantages has plagued millions of participating players with escalating severity in recent...
Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Hainin...
CANS
2008
Springer
159views Cryptology» more  CANS 2008»
14 years 5 days ago
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
ded abstract of this paper appeared in Proceedings of the 7th International Conference on Cryptology and Network Security (CANS '08) December 2
Michel Abdalla, Malika Izabachène, David Po...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 4 months ago
Security Enhancements in Novel Passive Optical Networks
— Passive Optical Networks (PONs) solve the bandwidth bottleneck issue as they extend optical networks to homes and businesses. Security concerns in time division multiplexed PON...
Alan Harris, Andres Sierra, Stamatios V. Kartalopo...
CORR
2007
Springer
123views Education» more  CORR 2007»
13 years 10 months ago
Security in Wireless Sensor Networks: Issues and Challenges
 Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology c...
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon H...
OOPSLA
2004
Springer
14 years 3 months ago
Bottleneck analysis in java applications using hardware performance monitors
This poster presents MonitorMethod which helps Java programmers gain insight in the behavior of their applications. MonitorMethod instruments the Java application and relates hard...
Dries Buytaert, Andy Georges, Lieven Eeckhout, Koe...