Sciweavers

6689 search results - page 164 / 1338
» A Network Security Monitor
Sort
View
ISI
2004
Springer
14 years 3 months ago
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
Abstract. This work describes a methodology that can be used to identify structure and communication patterns within an organization based on e-mail data. The first step of the me...
Petros Drineas, Mukkai S. Krishnamoorthy, Michael ...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 10 months ago
Certification Authority Monitored Multilevel and Stateful Policy Based Authorization in Services Oriented Grids
Services oriented grids will be more prominent among other kinds of grids in the present distributed environments. With the advent of online government services the governmental g...
Ajay Prasad, Saurabh Singh Verma, Ashok Kumar Shar...
PAISI
2007
Springer
14 years 4 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
SASN
2005
ACM
14 years 3 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
APNOMS
2006
Springer
14 years 2 months ago
Experiences in End-to-End Performance Monitoring on KOREN
As the network technology has been developed, the Next Generation Internet (NGI) such as Internet2, KOREN, KREONET2 and etc has been deployed to support bandwidth of Giga bps. And,...
Wang-Cheol Song, Deok-Jae Choi