Sciweavers

1657 search results - page 248 / 332
» Network flow spanners
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 3 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICNS
2007
IEEE
14 years 3 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
AINA
2005
IEEE
14 years 2 months ago
Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control
—The rapid growth of multimedia group-based applications motivates research into QoS guaranteed multicast network. In the multicast network carrying traffics of different QoS req...
Bo Rong, Maria Bennani, Michel Kadoch, Ahmed K. El...
AINA
2005
IEEE
14 years 2 months ago
HSM: A Fast Packet Classification Algorithm
– Packet classification on multiple header fields is one of the basic techniques used in network devices such as routers and firewalls, and usually the most computation intensive...
Bo Xu, Dongyi Jiang, Jun Li
GIS
2009
ACM
14 years 1 months ago
In-network query processing in mobile P2P databases
The in-network query processing paradigm in sensor networks postulates that a query is routed among sensors and collects the answers from the sensors on its trajectory. It works f...
Bo Xu, Fatemeh Vafaee, Ouri Wolfson