Sciweavers

741 search results - page 38 / 149
» Tools and techniques for Network Forensics
Sort
View
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 3 months ago
Security Enhancements in Novel Passive Optical Networks
— Passive Optical Networks (PONs) solve the bandwidth bottleneck issue as they extend optical networks to homes and businesses. Security concerns in time division multiplexed PON...
Alan Harris, Andres Sierra, Stamatios V. Kartalopo...
SIGCOMM
2000
ACM
14 years 1 months ago
Measuring link bandwidths using a deterministic model of packet delay
We describe a deterministic model of packet delay and use it to derive both the packet pair [2] property of FIFO-queueing networks and a new technique (packet tailgating) for acti...
Kevin Lai, Mary Baker
DIMVA
2011
13 years 11 days ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
FPL
2007
Springer
100views Hardware» more  FPL 2007»
14 years 3 months ago
Clock-Aware Placement for FPGAs
The programmable clock networks in FPGAs have a significant impact on overall power, area, and delay. Not only does the clock network itself dissipate a significant amount of powe...
Julien Lamoureux, Steven J. E. Wilton
IWPC
2006
IEEE
14 years 2 months ago
Experimental Settings in Program Comprehension: Challenges and Open Issues
Several approaches to program comprehension have been proposed along the years, ranging from fact extraction to sophisticated visualization tools. In order to effectively assess t...
Giuseppe A. Di Lucca, Massimiliano Di Penta