Sciweavers

7741 search results - page 36 / 1549
» Security in Active Networks
Sort
View
IWAN
2001
Springer
14 years 1 months ago
Deploying an Active Voice Application on a Three-Level Active Network Node Architecture
Active networks have been recently highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and customized packet pro...
Georg Carle, Henning Sanneck, Sebastian Zander, Lo...
ACSAC
2008
IEEE
14 years 3 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ITNG
2008
IEEE
14 years 3 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
NETWORKING
2007
13 years 10 months ago
The P2P War: Someone Is Monitoring Your Activities!
Anirban Banerjee, Michalis Faloutsos, Laxmi N. Bhu...