Sciweavers

5234 search results - page 111 / 1047
» Simulation of Computer Network Attacks
Sort
View
CCGRID
2006
IEEE
14 years 3 months ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 11 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
VISUALIZATION
2000
IEEE
14 years 1 months ago
A computational steering system for studying microwave interactions with missile bodies
This paper describes a computer modeling and simulation system that supports computational steering, which is an effort to make the typical simulation workflow more efficient. O...
J. Edward Swan II, Marco Lanzagorta, Doug Maxwell,...
SASN
2006
ACM
14 years 3 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
ACISICIS
2005
IEEE
14 years 2 months ago
Security Service Framework for Home Network
Home networking is the collection of elements that process, manage, transport, and store information, enabling the connection and integration of multiple computing, control, monit...
Zhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Ba...