Sciweavers

534 search results - page 96 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
DIMVA
2010
13 years 8 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
MOBICOM
2012
ACM
11 years 9 months ago
MARVEL: multiple antenna based relative vehicle localizer
Access to relative location of nearby vehicles on the local roads or on the freeways is useful for providing critical alerts to the drivers, thereby enhancing their driving experi...
Dong Li, Tarun Bansal, Zhixue Lu, Prasun Sinha
CORR
2004
Springer
162views Education» more  CORR 2004»
13 years 6 months ago
Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective
Wireless LANs have achieved a tremendous amount of growth in recent years. Among various wireless LAN technologies, the IEEE 802.11b based wireless LAN technology can be cited as ...
Srikant Sharma
CCS
2007
ACM
14 years 27 days ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 20 days ago
MCMSDA: A Multi-Channel Multi-Sector Directional Antenna Wireless LAN
Recently there is an increasing interest in using directional antennas and multi-channel for Ad-hoc wireless networks. Directional antennas provide higher capacity and less multi-...
Yong Huang, Weibo Gong, Dev Gupta