Sciweavers

2207 search results - page 45 / 442
» Security at the Internet Layer
Sort
View
IMC
2010
ACM
15 years 1 months ago
On the impact of layer-2 on node degree distribution
The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law s...
Pascal Mérindol, Benoit Donnet, Olivier Bon...
120
Voted
DKE
1999
87views more  DKE 1999»
15 years 3 months ago
Logical Foundations of Multilevel Databases
In this paper, we propose a formal model for multilevel databases. This model aims at being a generic model, that is it can be interpreted for any kind of database (relational, ob...
Frédéric Cuppens, Alban Gabillon
BROADNETS
2007
IEEE
15 years 10 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
WISE
2003
Springer
15 years 9 months ago
Using a Layered Approach for Interoperability on the Semantic Web
In this paper, we further develop a proposed layered approach for the Semantic Web. Our objective is to build a specific solution to the problem of providing data interoperability...
Isabel F. Cruz, Huiyong Xiao