Sciweavers

2081 search results - page 316 / 417
» Chaotic Systems Synchronization in Secure Communication Syst...
Sort
View
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 1 months ago
Peer-to-Peer Networks for Virtual Home Environments
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...
Chris Loeser, Wolfgang Müller 0003, Frank Ber...
MATA
2000
Springer
13 years 11 months ago
YAAP: Yet Another Active Platform
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure ...
Nicolas Rouhana, Samer Boustany, Eric Horlait
CISSE
2008
Springer
13 years 10 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
SIGCOMM
2010
ACM
13 years 8 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
INFOCOM
2011
IEEE
12 years 11 months ago
A comparative study of two network-based anomaly detection methods
—Modern networks are complex and hence, network operators often rely on automation to assist in assuring the security, availability, and performance of these networks. At the cor...
Kaustubh Nyalkalkar, Sushant Sinha, Michael Bailey...