Sciweavers

986 search results - page 55 / 198
» Protecting the Intranet Against
Sort
View
ISW
2010
Springer
13 years 7 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
WSS
2001
110views Control Systems» more  WSS 2001»
13 years 10 months ago
On the Security and Vulnerability of PING
We present a formal specification of the PING protocol, and use three concepts of convergence theory, namely closure, convergence, and protection, to show that this protocol is se...
Mohamed G. Gouda, Chin-Tser Huang, Anish Arora
GLOBECOM
2007
IEEE
14 years 3 months ago
A Distributed Bandwidth Sharing Heuristic for Backup LSP Computation
— With the advent of MPLS, the restoration times of communications is decreased down to 50 ms by the use of preconfigured backup LSPs. To ensure there are enough resources after ...
Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le ...
JSAC
2010
161views more  JSAC 2010»
13 years 4 months ago
Distortion optimal transmission of multi-layered FGS video over wireless channels
Abstract-- We identify an analytical expression for the distortion of a scalable video bitstream containing a Base Layer (BL) and one or more Enhancement Layer (EL) bitstreams. Con...
Negar Nejati, Homayoun Yousefi'zadeh, Hamid Jafark...
DMIN
2009
222views Data Mining» more  DMIN 2009»
13 years 7 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan