Sciweavers

1970 search results - page 390 / 394
» Security Without Firewalls
Sort
View
CN
2006
79views more  CN 2006»
13 years 7 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
COMCOM
2006
154views more  COMCOM 2006»
13 years 7 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
CN
2007
137views more  CN 2007»
13 years 7 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia
IJRR
2006
123views more  IJRR 2006»
13 years 7 months ago
Hybrid Control of the Berkeley Lower Extremity Exoskeleton (BLEEX)
The first functional load-carrying and energetically autonomous exoskeleton was demonstrated at U.C. Berkeley, walking at the average speed of 0.9 m/s (2 mph) while carrying a 34 ...
Hami Kazerooni, Ryan Steger, Lihua Huang
PR
2006
78views more  PR 2006»
13 years 7 months ago
Similarity-based analysis for large networks of ultra-low resolution sensors
By analyzing the similarities between bit streams coming from a network of motion detectors, we can recover the network geometry and discover structure in the human behavior being...
Christopher Richard Wren, David C. Minnen, Sriniva...