Sciweavers

87 search results - page 7 / 18
» The Use of Honeynets to Detect Exploited Systems Across Larg...
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks
Abstract—Spectrum sensing is one of the key enabling technologies in Cognitive Radio Networks (CRNs). In CRNs, secondary users (SUs) are allowed to exploit the spectrum opportuni...
Yanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni
HT
1997
ACM
13 years 11 months ago
Workspaces: The HyperDisco Approach to Internet Distribution
Hypermedia concepts are currently being deployed in a variety of information systems such as the World Wide Web, software development environments, large engineering enterprises, ...
Uffe Kock Wiil, John J. Leggett
RAID
2005
Springer
14 years 1 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ICDCS
2006
IEEE
14 years 1 months ago
SysProf: Online Distributed Behavior Diagnosis through Fine-grain System Monitoring
Runtime monitoring is key to the effective management of enterprise and high performance applications. To deal with the complex behaviors of today’s multi-tier applications runn...
Sandip Agarwala, Karsten Schwan
USS
2008
13 years 10 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian