Sciweavers

7741 search results - page 54 / 1549
» Security in Active Networks
Sort
View
CCS
2007
ACM
14 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
INFOCOM
2006
IEEE
14 years 3 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
ECTEL
2006
Springer
14 years 22 days ago
New Media for Teaching Applied Cryptography and Network Security
Considering that security education needs to train students to deal with security problems in real environments, we developed new media for teaching applied cryptography and networ...
Ji Hu, Dirk Cordel, Christoph Meinel
IJNSEC
2007
137views more  IJNSEC 2007»
13 years 9 months ago
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realiza...
Arshad Aziz, Nassar Ikram