Sciweavers

6689 search results - page 165 / 1338
» A Network Security Monitor
Sort
View
ADHOCNETS
2010
Springer
13 years 7 months ago
Guaranteeing Reliable Communications in Mesh Beacon-Enabled IEEE802.15.4 WSN for Industrial Monitoring Applications
Wireless Sensor Networks (WSN) are a very promising solution for industrial monitoring applications in terms of safety, costs, efficiency and productivity. However, in order to mov...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
CCS
2008
ACM
14 years 7 days ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
APNOMS
2007
Springer
14 years 2 months ago
End-to-End Flow Monitoring with IPFIX
End-to-End (E2E) flow monitoring is useful for observing performance of networks such as throughput, loss rate, and jitter. Typically, E2E flow monitoring is carried out at end hos...
Byungjoon Lee, Hyeongu Son, Seunghyun Yoon, Youngs...
COMSWARE
2006
IEEE
14 years 2 months ago
VoIP service quality monitoring using active and passive probes
Service providers and enterprises all over the world are rapidly deploying Voice over IP (VoIP) networks because of reduced capital and operational expenditure, and easy creation o...
Shipra Agrawal, P. P. S. Narayan, Jeyashankher Ram...
OOPSLA
2007
Springer
14 years 4 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden