Sciweavers

1995 search results - page 101 / 399
» Belief in Information Flow
Sort
View
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
14 years 3 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 3 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu
ICDIM
2008
IEEE
14 years 3 months ago
A NetFlow based internet-worm detecting system in large network
Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. ...
COMSWARE
2007
IEEE
14 years 3 months ago
Leveraging MAC-layer information for single-hop wireless transport in the Cache and Forward Architecture of the Future Internet
— Cache and Forward (CNF) Architecture is a novel architecture aimed at delivering content efficiently to potentially large number of intermittently connected mobile hosts. It us...
Sumathi Gopal, Sanjoy Paul, Dipankar Raychaudhuri