Sciweavers

1411 search results - page 213 / 283
» Performance analysis of BitTorrent-like systems with heterog...
Sort
View
EDBTW
2010
Springer
14 years 4 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
14 years 3 months ago
An Orthogonal Projection Approach for Blind Beamforming in Multipath CDMA Channels
In this paper, we propose a blind beamforming technique for multipath CDMA channels, which requires prior knowledge of only the spreading code and the timing of the desired user. ...
Jianshu Chen, Jian Wang, Pengyu Zhang, Jian Yuan, ...
RAID
2010
Springer
13 years 7 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 2 months ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
HICSS
2003
IEEE
201views Biometrics» more  HICSS 2003»
14 years 2 months ago
Design and Evaluation of Improvement method on the Web Information Navigation - A Stochastic Search Approach
With the advent of fast growing Internet and World Wide Web (WWW), more and more companies start the electronic commerce to enhance the business competitiveness. On the other hand...
Benjamin P.-C. Yen, Y.-W. Wan