Sciweavers

7741 search results - page 43 / 1549
» Security in Active Networks
Sort
View
91
Voted
CRITIS
2006
15 years 7 months ago
Vulnerabilities and Possible Attacks Against the GPRS Backbone Network
Christos Xenakis, Lazaros F. Merakos
91
Voted
CCS
2010
ACM
15 years 3 months ago
Spectrum based fraud detection in social networks
Xiaowei Ying, Xintao Wu, Daniel Barbará
114
Voted
WS
2004
ACM
15 years 8 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
127
Voted
PERCOM
2006
ACM
16 years 3 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
150
Voted
BNCOD
2003
150views Database» more  BNCOD 2003»
15 years 4 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray