Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
This paper proposes a macroscopic fluid dynamic model dealing with the flows of information on a telecommunication network with sources and destinations. The model consists of a co...
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
In absence of any link layer traffic controls or priorityqueuing mechanism in LAN infrastructure (such as shared media LAN), Subnet Bandwidth Management based approach of managing...
Networked reconfiguration is an enabling technology for cost effective service deployment and maintenance. A hardware virtual machine to enable this networked reconfigurapresented...
Yajun Ha, Patrick Schaumont, Marc Engels, Serge Ve...