Sciweavers

2135 search results - page 103 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
INFOCOM
2002
IEEE
14 years 1 months ago
How to market-manage a QoS network
This paper describes a control mechanism for a future Internet. It is an economic mechanism that enables users to choose different pairs of price/QoS priority levels for network se...
Jörn Altmann, Huw Oliver, Hans Daanen, Alfons...
HICSS
2005
IEEE
132views Biometrics» more  HICSS 2005»
14 years 1 months ago
NusEye: Visualizing Network Structure to Support Navigation of Aggregated Content
The application of social network analysis techniques, along with graph visualization and interaction, for navigating syndicated web content, a.k.a webfeeds, is presented. Within ...
Brian M. Dennis, Azzari Caillier Jarrett
INFOCOM
1999
IEEE
14 years 14 days ago
Performance Analysis on Path Rerouting Algorithms for Handoff Control in Mobile ATM Networks
This paper studies mobile-generated traffic distributions in mobile ATM networks and evaluates the performance of path rerouting algorithms for handoff control. In mobile ATM netwo...
Jun Li, Roy D. Yates, Dipankar Raychaudhuri
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 9 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...