Sciweavers

7741 search results - page 52 / 1549
» Security in Active Networks
Sort
View
PADS
1999
ACM
14 years 1 months ago
Active Virtual Network Management Protocol
This paper introduces a novel algorithm, the Active Virtual Network Management Protocol AVNMP, for predictive network management. It explains how the Active Virtual Network Mana...
Stephen F. Bush
EUROSSC
2007
Springer
14 years 3 months ago
CenceMe - Injecting Sensing Presence into Social Networking Applications
Abstract. We present the design, prototype implementation, and evaluation of CenceMe, a personal sensing system that enables members of social networks to share their sensing prese...
Emiliano Miluzzo, Nicholas D. Lane, Shane B. Eisen...
ESORICS
2006
Springer
14 years 22 days ago
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
Vitaly Shmatikov, Ming-Hsiu Wang
IEEEARES
2006
IEEE
14 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
IPCCC
2007
IEEE
14 years 3 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong