Sciweavers

6689 search results - page 67 / 1338
» A Network Security Monitor
Sort
View
CONEXT
2005
ACM
13 years 10 months ago
Bottleneck detection in UMTS via TCP passive monitoring: a real case
Fabio Ricciato, Francesco Vacirca, Martin Karner
ADHOCNOW
2006
Springer
14 years 2 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel
ASIASIM
2004
Springer
14 years 2 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
ISF
2010
164views more  ISF 2010»
13 years 6 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu