Sciweavers

900 search results - page 113 / 180
» Controlling Inbound Traffic
Sort
View
ETFA
2008
IEEE
13 years 11 months ago
Green surveillance applications
Currently, falling prices in technologies associated with surveillance applications has led to a huge increase in their use in all types of environments, although the most common ...
Javier Silvestre-Blanes
IEEESP
2008
136views more  IEEESP 2008»
13 years 9 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
TSMC
2008
187views more  TSMC 2008»
13 years 9 months ago
A Position-Based Clustering Technique for Ad Hoc Intervehicle Communication
Abstract--Intervehicle communication is a key technique of intelligent transport systems. Recently, ad hoc networking in the vehicular environment was investigated intensively. Thi...
Zhigang Wang, Lichuan Liu, MengChu Zhou, N. Ansari
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
TDSC
2010
168views more  TDSC 2010»
13 years 4 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou