Sciweavers

2673 search results - page 59 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
SP
2006
IEEE
127views Security Privacy» more  SP 2006»
14 years 1 months ago
Siren: Catching Evasive Malware (Short Paper)
With the growing popularity of anomaly detection systems, which is due partly to the rise in zero-day attacks, a new class of threats have evolved where the attacker mimics legiti...
Kevin Borders, Xin Zhao, Atul Prakash
CCGRID
2003
IEEE
14 years 1 months ago
DKS (N, k, f): A Family of Low Communication, Scalable and Fault-Tolerant Infrastructures for P2P Applications
In this paper, we present DKS(N, k, f), a family of infrastructures for building Peer-To-Peer applications. Each instance of DKS(N, k, f) is a fully decentralized overlay network ...
Luc Onana Alima, Sameh El-Ansary, Per Brand, Seif ...
IFIP
2004
Springer
14 years 1 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly a...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 2 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
FGCN
2007
IEEE
111views Communications» more  FGCN 2007»
14 years 2 months ago
New Algorithm for Effective Utilization of Bandwidth for Sensitive Applications
In this paper, we propose an algorithm, which allocates the bandwidth in an effective manner for sensitive applications. The main idea of this work is to allocate more amount of b...
G. Varaprasad, R. S. D. Wahida Banu, Pallapa Venka...