Sciweavers

4263 search results - page 796 / 853
» Network Security
Sort
View
CEC
2005
IEEE
14 years 17 hour ago
Nonlinear mapping using particle swarm optimisation
Abstract— Nonlinear mapping is an approach of multidimensional scaling where a high-dimensional space is transformed into a lower-dimensional space such that the topological char...
Auralia I. Edwards, Andries Petrus Engelbrecht, Ne...
DIMVA
2004
13 years 11 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
SIGCOMM
2009
ACM
14 years 4 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
EUROSYS
2010
ACM
14 years 7 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea