Sciweavers

785 search results - page 66 / 157
» Cache Behavior of Network Protocols
Sort
View
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
14 years 1 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
DSN
2005
IEEE
14 years 1 months ago
Fatih: Detecting and Isolating Malicious Routers
Network routers occupy a key role in modern data transport and consequently are attractive targets for attackers. By manipulating, diverting or dropping packets arriving at a comp...
Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo...
NETWORK
2010
158views more  NETWORK 2010»
13 years 2 months ago
Broadcasting safety information in vehicular networks: issues and approaches
A primary goal of intelligent transportation systems is to improve road safety. The ability of vehicles to communicate is a promising way to alleviate traffic accidents by reducin...
R. Chen, Wen-Long Jin, A. Regan
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 7 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
CIBCB
2007
IEEE
14 years 2 months ago
Evolving Extremal Epidemic Networks
The susceptible, infected, removed model for epidemics assumes that the population in which the epidemic takes place is well mixed. This strong assumption can be relaxed by permit...
Dan Ashlock, Fatemeh Jafargholi