Sciweavers

141 search results - page 16 / 29
» Intrusion Detection Routers: Design, Implementation and Eval...
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 10 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
SIGCSE
2009
ACM
168views Education» more  SIGCSE 2009»
14 years 7 months ago
Bringing big systems to small schools: distributed systems for undergraduates
Distributed applications have become a core component of the Internet's infrastructure. However, many undergraduate curriculums, especially at small colleges, do not offer co...
Jeannie R. Albrecht
HPCA
2006
IEEE
14 years 7 months ago
BulletProof: a defect-tolerant CMP switch architecture
As silicon technologies move into the nanometer regime, transistor reliability is expected to wane as devices become subject to extreme process variation, particle-induced transie...
Kypros Constantinides, Stephen Plaza, Jason A. Blo...
SEM
2004
Springer
14 years 2 days ago
PlanetSim: A New Overlay Network Simulation Framework
Abstract. Current research in peer to peer systems is lacking appropriate environments for simulation and experimentation of large scale overlay services. This has led to a plethor...
Pedro García López, Carles Pairot, R...
VIROLOGY
2010
128views more  VIROLOGY 2010»
13 years 5 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...