Sciweavers

6689 search results - page 61 / 1338
» A Network Security Monitor
Sort
View
PERVASIVE
2006
Springer
13 years 8 months ago
Enhancing Security and Privacy in Traffic-Monitoring Systems
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
ICC
2009
IEEE
153views Communications» more  ICC 2009»
14 years 3 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
PAM
2005
Springer
14 years 2 months ago
Scalable Coordination Techniques for Distributed Network Monitoring
Abstract. Emerging network monitoring infrastructures capture packetlevel traces or keep per-flow statistics at a set of distributed vantage points. Today, distributed monitors in...
Manish R. Sharma, John W. Byers
COMPSEC
2004
91views more  COMPSEC 2004»
13 years 8 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
HOTI
2002
IEEE
14 years 1 months ago
Radioport: A Radio Network for Monitoring and Diagnosing Computer Systems
A radio network is described for configuring, monitoring, and diagnosing the components of a computer system. Such a network offers several advantages: (a) it improves the robustn...
Hans Eberle