Sciweavers

219 search results - page 28 / 44
» Highly efficient techniques for network forensics
Sort
View
JSAC
2006
149views more  JSAC 2006»
13 years 7 months ago
A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks
The optimal and distributed provisioning of high throughput in mesh networks is known as a fundamental but hard problem. The situation is exacerbated in a wireless setting due to t...
Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li
PERCOM
2005
ACM
14 years 7 months ago
Hoarding Content in M-Learning Context
With the advances in mobile technologies is now possible to support learners and teachers activities on the move. We analyzed the functionalities that should be provided by a gene...
Anna Trifonova, Marco Ronchetti
JCIT
2010
161views more  JCIT 2010»
13 years 2 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao
ICDE
2005
IEEE
180views Database» more  ICDE 2005»
14 years 8 months ago
A Unified Framework for Monitoring Data Streams in Real Time
Online monitoring of data streams poses a challenge in many data-centric applications, such as telecommunications networks, traffic management, trend-related analysis, webclick st...
Ahmet Bulut, Ambuj K. Singh
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman