Sciweavers

6689 search results - page 167 / 1338
» A Network Security Monitor
Sort
View
PCM
2001
Springer
119views Multimedia» more  PCM 2001»
14 years 2 months ago
IP Traffic Monitoring: An Overview and Future Considerations
An overview on emerging IP traffic monitoring is presented. Important parameters to characterize the traffic, network and QoS, are discussed. The infrastructure and methodology to ...
Dong Wei, Nirwan Ansari
IWNAS
2008
IEEE
14 years 4 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
CCS
2008
ACM
14 years 8 days ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
TCOM
2010
220views more  TCOM 2010»
13 years 8 months ago
Fiber fault PON monitoring using optical coding: Effects of customer geographic distribution
Abstract—We analyze the performance of fiber fault monitoring of a PON using a centralized, passive optical coding (OC) system. We develop an expression for the detected monitor...
Mohammad M. Rad, Habib Fathallah, Leslie A. Rusch
ICN
2009
Springer
13 years 8 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor