Sciweavers

5234 search results - page 188 / 1047
» Simulation of Computer Network Attacks
Sort
View
ISCA
2006
IEEE
120views Hardware» more  ISCA 2006»
15 years 8 months ago
Interconnection Networks for Scalable Quantum Computers
We show that the problem of communication in a quantum computer reduces to constructing reliable quantum channels by distributing high-fidelity EPR pairs. We develop analytical m...
Nemanja Isailovic, Yatish Patel, Mark Whitney, Joh...
RAID
2005
Springer
15 years 7 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
124
Voted
SOUPS
2010
ACM
15 years 6 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
MSWIM
2006
ACM
15 years 8 months ago
The effect of the radio wave propagation model in mobile ad hoc networks
The simulation of wireless networks has been an important tool for researchers and the industry in the last years. Especially in the field of Mobile Ad Hoc Networking, most curre...
Arne Schmitz, Martin Wenig
97
Voted
WSC
2004
15 years 3 months ago
Ontologies for Modeling and Simulation: Issues and Approaches
Ontologies represent the next important phase of the World Wide Web, creating a semantic web which links together disparate pieces of information and knowledge. Creating ontologie...
Paul A. Fishwick, John A. Miller