Sciweavers

58 search results - page 9 / 12
» An area-efficient and protected network interface for proces...
Sort
View
INFOCOM
1999
IEEE
13 years 11 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
VIZSEC
2005
Springer
14 years 26 days ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
MSWIM
2006
ACM
14 years 1 months ago
Location-based admission control for differentiated services in 3G cellular networks
Third generation wireless systems can simultaneously accommodate flow transmissions of users with widely heterogeneous applications. As resources are limited (particularly in the...
Rudesindo Núñez-Queija, Hwee Pink Ta...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 8 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
VIZSEC
2004
Springer
14 years 22 days ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah