Sciweavers

19 search results - page 2 / 4
» Internet attacks monitoring with dynamic connection redirect...
Sort
View
PROCEDIA
2010
153views more  PROCEDIA 2010»
13 years 5 months ago
Conceptual framework for dynamic trust monitoring and prediction
The dynamic and collaborative nature of mobile and sensor networks raises the issue of how connected mobile devices can be trusted. Despite the existing security paradigms such as...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
DSN
2009
IEEE
14 years 2 months ago
Data management mechanisms for embedded system gateways
It is becoming increasingly common to connect traditional embedded system networks to the Internet for remote monitoring, high-level control and integration. It is necessary to pr...
Justin Ray, Philip Koopman
PAM
2012
Springer
12 years 2 months ago
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
Maria Konte, Nick Feamster
SIGCOMM
2009
ACM
14 years 1 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
USITS
2003
13 years 8 months ago
Adaptive Overload Control for Busy Internet Servers
As Internet services become more popular and pervasive, a critical problem that arises is managing the performance of services under extreme overload. This paper presents a set of...
Matt Welsh, David E. Culler