Sciweavers

101 search results - page 17 / 21
» The Bloom paradox: When not to use a Bloom filter
Sort
View
DSN
2007
IEEE
14 years 10 days ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ANCS
2006
ACM
14 years 4 days ago
Packet classification using coarse-grained tuple spaces
While the problem of high performance packet classification has received a great deal of attention in recent years, the research community has yet to develop algorithmic methods t...
Haoyu Song, Jonathan S. Turner, Sarang Dharmapurik...
SECON
2008
IEEE
14 years 2 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
ICPPW
2000
IEEE
14 years 24 days ago
Challenges in URL Switching for Implementing Globally Distributed Web Sites
URL, or layer-5, switches can be used to implement locally and globally distributed web sites. URL switches must be able to exploit knowledge of server load and content (e.g., of ...
Zornitza Genova, Kenneth J. Christensen
IJISEC
2006
119views more  IJISEC 2006»
13 years 8 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...