Sciweavers

4263 search results - page 99 / 853
» Network Security
Sort
View
74
Voted
CORR
2008
Springer
71views Education» more  CORR 2008»
15 years 2 months ago
On the Secure Degrees of Freedom of Wireless X Networks
Previous work showed that the X network with M transmitters, N receivers has MN M+N-1 degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy...
Tiangao Gou, Syed Ali Jafar
117
Voted
ITNG
2007
IEEE
15 years 9 months ago
Securing MPLS Networks with Multi-path Routing
— MPLS security is an evolving issue which has been raised by many researchers and service providers. The basic architecture of MPLS network does not provide security services su...
Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal
115
Voted
ACSAC
1998
IEEE
15 years 6 months ago
How to Increase Security in Mobile Networks by Anomaly Detection
The increasing complexity of cellular radio networks yields new demands concerning network security. Especially the task of detecting, repulsing and preventing abuse both by in- a...
Roland Büschkes, Dogan Kesdogan, Peter Reichl
165
Voted
VIZSEC
2004
Springer
15 years 8 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee
120
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu