Sciweavers

1852 search results - page 224 / 371
» Block-level link analysis
Sort
View
JDFP
2006
109views more  JDFP 2006»
13 years 9 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
SP
2008
IEEE
187views Security Privacy» more  SP 2008»
13 years 9 months ago
Efficient and Robust TCP Stream Normalization
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
Mythili Vutukuru, Hari Balakrishnan, Vern Paxson
TCOM
2008
103views more  TCOM 2008»
13 years 9 months ago
On the design of uplink and downlink group-orthogonal multicarrier wireless systems
Abstract--Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as an attractive mutiplexing technique for the uplink segment of wireless syste...
Felip Riera-Palou, Guillem Femenias, Jaume Ramis
JCM
2007
114views more  JCM 2007»
13 years 9 months ago
Tunable Pulse Amplitude and Position Modulation Technique for Reliable Optical Wireless Communication Channels
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
JNW
2007
118views more  JNW 2007»
13 years 9 months ago
Alternate Routing in Tandem Traffic-Groomed Optical Networks
— Recent advances in telecommunication networks have allowed WDM to emerge as a viable solution to the ever-increasing demands of the Internet. Because these networks carry large...
Alicia Nicki Washington, Harry G. Perros