Network operators use traffic engineering (TE) to control the flow of traffic across their networks. Existing TE methods require manual configuration of link weights or tunnels, w...
Srikanth Sundaresan, Cristian Lumezanu, Nick Feams...
Software-based Network Intrusion Detection Systems (NIDS) often fail to keep up with high-speed network links. In this paper an FPGA-based pre-filter is presented that reduces th...
Haoyu Song, Todd S. Sproull, Michael Attig, John W...
Current networked information systems on the Internet, whilst extremely successful, run into problems of fragmentation, consistency, scalability, and loss of orientation. The deve...
The lifetime of wireless sensor network is crucial, since autonomous operation must be guaranteed over an extended period. As all the sensor data has to be forwarded to an observe...
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...