Sciweavers

7741 search results - page 43 / 1549
» Security in Active Networks
Sort
View
CCS
2010
ACM
13 years 9 months ago
Spectrum based fraud detection in social networks
Xiaowei Ying, Xintao Wu, Daniel Barbará
WS
2004
ACM
14 years 2 months ago
A framework for wireless LAN monitoring and its applications
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of th...
Jihwang Yeo, Moustafa Youssef, Ashok K. Agrawala
PERCOM
2006
ACM
14 years 8 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
BNCOD
2003
150views Database» more  BNCOD 2003»
13 years 10 months ago
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database o...
Indrakshi Ray