Sciweavers

209 search results - page 6 / 42
» Effective Shadow Detection in Traffic Monitoring Application...
Sort
View
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
14 years 3 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
14 years 3 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
14 years 10 months ago
ViEWNet: Visual Exploration of Region-Wide Traffic Networks
Location-based services and data mining algorithms analyzing objects moving on a complex traffic network are becoming increasingly important. In this paper, we introduce a new app...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
ISPA
2004
Springer
14 years 2 months ago
Performance Evaluation of a Grid Computing Architecture Using Realtime Network Monitoring
This paper integrates the concepts of realtime network monitoring and visualizations into a grid computing architecture on the Internet. We develop a Realtime Network Monitor(RNM) ...
Young-Sik Jeong, Cheng-Zhong Xu
IEEEARES
2008
IEEE
14 years 3 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...