Sciweavers

1266 search results - page 71 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
15 years 3 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
DSRT
2003
IEEE
15 years 9 months ago
Performance Evaluation of the Managed Bandwidth Service with QoS Guarantees
This paper describes a solution to extend the Managed Bandwidth Service (MBS), which is provided on a backbone network using MPLS VPNs, to non-MPLS domains and also evaluates it. ...
Christos Bouras, Vaggelis Kapoulas, Dimitris Primp...
GLOBECOM
2009
IEEE
15 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
DFN
2003
15 years 5 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
WETICE
2000
IEEE
15 years 8 months ago
Towards an Evaluation Methodology for the Development of Research-Oriented Virtual Communities
A virtual community is a group of people whose shared needs and/or interests are largely communicated within, and mediated by Webenabled interactions, e.g., within a Website. Whil...
Janet Ho, Monica M. C. Schraefel, Mark H. Chignell