Sciweavers

115 search results - page 20 / 23
» An Effective Anomaly Detection Method in SMTP Traffic
Sort
View
DISCEX
2003
IEEE
14 years 25 days ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
CN
2008
128views more  CN 2008»
13 years 7 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
JUCS
2006
146views more  JUCS 2006»
13 years 7 months ago
Health Monitoring and Assistance to Support Aging in Place
: To many people, home is a sanctuary. For those people who need special medical care, they may need to be pulled out of their home to meet their medical needs. As the population a...
Diane J. Cook
IEICET
2006
112views more  IEICET 2006»
13 years 7 months ago
Background TCP Data Transfer with Inline Network Measurement
In the present paper, ImTCP-bg, a new background TCP data transfer mechanism that uses an inline network measurement technique, is proposed. ImTCP-bg sets the upper limit of the co...
Tomoaki Tsugawa, Go Hasegawa, Masayuki Murata
COMCOM
2004
149views more  COMCOM 2004»
13 years 7 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin