Sciweavers

8177 search results - page 88 / 1636
» Detecting System Emulators
Sort
View
IM
2007
13 years 11 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
SIGMETRICS
2002
ACM
117views Hardware» more  SIGMETRICS 2002»
13 years 9 months ago
Context-aware TCP/IP
Abstract-This paper discusses the design and evaluation of CATNIP, a ContextAware Transport/Network Internet Protocol for the Web. This integrated protocol uses application-layer k...
Carey L. Williamson, Qian Wu
INFOCOM
2010
IEEE
13 years 8 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
ICDCS
2006
IEEE
14 years 4 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
ICASSP
2011
IEEE
13 years 1 months ago
Robust frequency synchronization for an OFDMA uplink system disturbed by a Cognitive Radio system interference
In Cognitive Radio (CR) systems, spectrum sensing plays a key role to determine the free frequency bands. However, when the primaryuser (PU) signal spectrum exhibits localized fad...
Hector Poveda, Guillaume Ferre, Eric Grivel