Sciweavers

1278 search results - page 248 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
On Scalability of Proximity-Aware Peer-to-Peer Streaming
—P2P (peer-to-peer) technology has proved itself an efficient and cost-effective solution to support large-scale multimedia streaming. Different from traditional P2P application...
Liang Dai, Yi Cui, Yuan Xue
SLIP
2003
ACM
14 years 1 months ago
Fast estimation of the partitioning rent characteristic using a recursive partitioning model
In the past, a priori interconnect prediction, based on Rent’s rule, has been applied mainly for technology evaluation and roadmap applications. These applications do not requir...
Joni Dambre, Dirk Stroobandt, Jan Van Campenhout
FIS
2010
13 years 5 months ago
Energy Consumption Information Services for Smart Home Inhabitants
We investigate services giving users an adequate insight on his or her energy consumption habits in order to optimize it in the long run. The explored energy awareness services are...
Michael Schwanzer, Anna Fensel
IMC
2009
ACM
14 years 2 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
CIIT
2004
268views Communications» more  CIIT 2004»
13 years 9 months ago
SSM-ping: A ping utility for source specific multicast
Management has become a key concern for the success of multicast deployment in the Internet. One of the most important management tasks for multicast is to verify the availability...
Pavan Namburi, Kamil Saraç, Kevin C. Almero...