Sciweavers

948 search results - page 107 / 190
» Making a Game of Network Security
Sort
View
111
Voted
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 2 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
TON
2010
105views more  TON 2010»
14 years 10 months ago
Internet QoS and Regulations
This paper investigates the effects of transition from a single-service class to two-service classes in the Internet. We consider multiple competing Internet Service Providers (ISP...
Nikhil Shetty, Galina Schwartz, Jean C. Walrand
115
Voted
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
15 years 9 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
147
Voted
ECUMN
2007
Springer
15 years 9 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
125
Voted
WS
2005
ACM
15 years 9 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble