Sciweavers

6689 search results - page 98 / 1338
» A Network Security Monitor
Sort
View
CLUSTER
2003
IEEE
15 years 8 months ago
Wide Area Cluster Monitoring with Ganglia
In this paper, we present a structure for monitoring a large set of computational clusters. We illustrate methods for scaling a monitor network comprised of many clusters while ke...
Federico D. Sacerdoti, Mason J. Katz, Matthew L. M...
PET
2009
Springer
15 years 9 months ago
On the Optimal Placement of Mix Zones
Abstract. In mobile wireless networks, third parties can track the location of mobile nodes by monitoring the pseudonyms used for identification. A frequently proposed solution to...
Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux
ACSAC
2006
IEEE
15 years 9 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
ACSAC
2004
IEEE
15 years 6 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...