Sciweavers

360 search results - page 43 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
SECURWARE
2008
IEEE
14 years 2 months ago
Email Worm Mitigation by Controlling the Name Server Response Rate
Email worms and the spam associated with them are one of the main operational security issues today because they waste time, money and resources. The high incidence of email worms...
Nikolaos Chatzis, Enric Pujol
CCS
2007
ACM
14 years 14 days ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
WS
2005
ACM
14 years 2 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
ECAI
2004
Springer
14 years 1 months ago
An Active, Ontology-driven Network Service for Internet Collaboration
: Web portals have emerged as an important means of collaboration on the WWW, and the integration of ontologies promises to make them more accurate in how they serve users’ colla...
David Lewis, Kevin Feeney, Thanassis Tiropanis, Si...
GLOBECOM
2009
IEEE
14 years 3 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...