Sciweavers

2747 search results - page 122 / 550
» Network externalities in software systems
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 3 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...
CISIS
2007
IEEE
14 years 3 months ago
Implementation and Performance of a New Teleconference System by High Definition Omni-Directional Video Transmission over IP Net
In this paper, a flexible middleware system for omni-directional video transmission for various teleconferencing applications is introduced. The omni-directional image has more ad...
Yosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka...
EUROSYS
2008
ACM
14 years 6 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
CODES
2009
IEEE
14 years 3 months ago
Exploiting data-redundancy in reliability-aware networked embedded system design
This paper presents a system-level design methodology for networked embedded systems that exploits existing data-redundancy to increase their reliability. The presented approach n...
Martin Lukasiewycz, Michael Glaß, Jürge...
WOSP
2004
ACM
14 years 2 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...