Sciweavers

6696 search results - page 1237 / 1340
» Securing social networks
Sort
View
GLOBECOM
2010
IEEE
13 years 8 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
IMC
2010
ACM
13 years 8 months ago
A first look at traffic on smartphones
Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mah...
MOBIHOC
2010
ACM
13 years 8 months ago
Detecting intra-room mobility with signal strength descriptors
We explore the problem of detecting whether a device has moved within a room. Our approach relies on comparing summaries of received signal strength measurements over time, which ...
Konstantinos Kleisouris, Bernhard Firner, Richard ...
WEA
2010
Springer
311views Algorithms» more  WEA 2010»
13 years 8 months ago
Realtime Classification for Encrypted Traffic
Classifying network flows by their application type is the backbone of many crucial network monitoring and controlling tasks, including billing, quality of service, security and tr...
Roni Bar-Yanai, Michael Langberg, David Peleg, Lia...
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 5 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
« Prev « First page 1237 / 1340 Last » Next »