Sciweavers

207 search results - page 26 / 42
» Automated Protocol Implementations Based on Activity Threads
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
14 years 1 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
MOBICOM
2010
ACM
13 years 7 months ago
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks
In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node ...
Eugenio Magistretti, Omer Gurewitz, Edward W. Knig...
WSC
2007
13 years 10 months ago
Modeling and simulation of hard disk dive final assembly using a HDD template
A HDD template is designed and developed for modeling and simulation for final assembly of hard disk drive (HDD) manufacturing using Arena. The designed HDD template is a high fle...
Ahad Ali, Robert de Souza
JCM
2006
135views more  JCM 2006»
13 years 7 months ago
Bandwidth Allocation and Session Scheduling using SIP
Session Initiation Protocol (SIP) is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SI...
Hassan Hassan 0002, Jean-Marie Garcia, Olivier Bru...