Sciweavers

150 search results - page 17 / 30
» Agent-Based Network Protection Against Malicious Code
Sort
View
ASPLOS
2004
ACM
14 years 27 days ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
14 years 1 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
ISCAS
2007
IEEE
171views Hardware» more  ISCAS 2007»
14 years 1 months ago
Using H.264/AVC-based Scalable Video Coding (SVC) for Real Time Streaming in Wireless IP Networks
— A streaming system based on the Scalable Video Coding (SVC) extension of H.264/AVC is shown. SVC allows for data rate adaptation without re-encoding just by dropping packets of...
Thomas Schierl, Cornelius Hellge, Shpend Mirta, Ka...
HPCA
2006
IEEE
14 years 7 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
GLOBECOM
2007
IEEE
14 years 1 months ago
GMPLS-Based Hybrid 1+N Link Protection Over p-Cycles: Design and Performance
—In [1], the author introduced a strategy to use network coding on p-Cycles in order to provide 1+N protection for straddling connections and links against single link failures i...
Ahmed E. Kamal