Sciweavers

948 search results - page 40 / 190
» Making a Game of Network Security
Sort
View
ICIP
2008
IEEE
14 years 3 months ago
Fairness dynamics in multimedia colluders' social networks
Multimedia social network analysis is a research area with growing importance, in which the social network members share multimedia contents with all different purposes and analyz...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
HASE
1998
IEEE
14 years 28 days ago
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks
A well-known security problem with MPOA is that cutthrough connections generally bypasses firewall routers if there are any. None of the previously proposed approaches solved the ...
Jun Xu, Mukesh Singhal
SP
2000
IEEE
14 years 1 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
CN
2004
106views more  CN 2004»
13 years 8 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
ISI
2004
Springer
14 years 2 months ago
Discovering Hidden Groups in Communication Networks
We describe models and efficient algorithms for detecting groups (communities) functioning in communication networks which attempt to hide their functionality – hidden groups. O...
Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ism...