Sciweavers

272 search results - page 37 / 55
» A flow based approach for SSH traffic detection
Sort
View
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 8 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
TWC
2010
13 years 3 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
ISMAR
2007
IEEE
14 years 3 months ago
Real-Time Object Tracking for Augmented Reality Combining Graph Cuts and Optical Flow
We present an efficient and accurate object tracking algorithm based on the concept of graph cut segmentation. The ability to track visible objects in real-time provides an inval...
Jonathan Mooser, Suya You, Ulrich Neumann
LCN
2006
IEEE
14 years 2 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz