Sciweavers

133 search results - page 8 / 27
» FluXOR: Detecting and Monitoring Fast-Flux Service Networks
Sort
View
SASN
2006
ACM
14 years 1 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
APNOMS
2008
Springer
13 years 9 months ago
A Management Framework for IMS Using Service Managed Objects
In this paper we identify the needs and critical issues of management and monitoring in IP Multimedia Subsystem (IMS). As an IMS provides a layered architecture converging heteroge...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
PERCOM
2003
ACM
14 years 7 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
VIZSEC
2007
Springer
14 years 1 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
ATAL
2009
Springer
14 years 23 hour ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...