Sciweavers

5234 search results - page 156 / 1047
» Simulation of Computer Network Attacks
Sort
View
CSREASAM
2006
13 years 11 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
PADS
2003
ACM
14 years 2 months ago
Scalable RTI-Based Parallel Simulation of Networks
Federated simulation interfaces such as the High Level Architecture (HLA) were designed for interoperability, and as such are not traditionally associated with highperformance com...
Kalyan S. Perumalla, Alfred Park, Richard M. Fujim...
NDSS
2003
IEEE
14 years 2 months ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum
TGC
2007
Springer
14 years 3 months ago
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
Abstract. We propose and discuss foundations for programmable overlay networks and overlay computing systems. Such overlays are built over a large number of distributed computation...
Luigi Liquori, Michel Cosnard
DANCE
2002
IEEE
14 years 2 months ago
SANDS: Specialized Active Networking for Distributed Simulation
This paper provides an overview of SANDS (Specialized Active Networking for Distributed Simulation), a DARPA-ITO sponsored research project that is using active networking to deve...
Steve Zabele, M. Dorsch, Zihui Ge, Ping Ji, Mark K...