Sciweavers

272 search results - page 38 / 55
» A flow based approach for SSH traffic detection
Sort
View
IASSE
2004
13 years 10 months ago
System Evolution through Design Information Evolution: a Case Study
This paper describes how design information, in our case UML specifications, can be used to evolve a software system and validate the consistency of such an evolution. This work c...
Walter Cazzola, Ahmed Ghoneim, Gunter Saake
PDCN
2004
13 years 10 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
IM
2007
13 years 10 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
CN
2002
91views more  CN 2002»
13 years 8 months ago
Mapping of performance metrics between IP and ATM
End-to-end QoS requires mapping of QoS between heterogeneous subnetworks of the end-to-end path. For this mapping to be accurate, we argue, in this paper, that it should be based ...
Tijani Chahed, Gérard Hébuterne, Guy...
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han