Sciweavers

6689 search results - page 48 / 1338
» A Network Security Monitor
Sort
View
118
Voted
AIMS
2009
Springer
15 years 6 months ago
Flow Monitoring in Wireless MESH Networks
We present a dynamic and self-organized flow monitoring framework in Wireless Mesh Networks. An algorithmic mechanism that allows for an autonomic organization of the probes plane...
Cristian Popi, Olivier Festor
132
Voted
CCS
1994
ACM
15 years 7 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
126
Voted
ICPADS
2008
IEEE
15 years 9 months ago
An Efficient Policy System for Body Sensor Networks
Body sensor networks (BSNs) have become a promising technology for healthcare, in which biosensors continuously monitor physiological parameters of a user. Distinct from conventio...
Yanmin Zhu, Sye Loong Keoh, Morris Sloman, Emil Lu...
128
Voted
CCS
2004
ACM
15 years 8 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
NETWORKING
2007
15 years 4 months ago
The P2P War: Someone Is Monitoring Your Activities!
Anirban Banerjee, Michalis Faloutsos, Laxmi N. Bhu...