Sciweavers

1737 search results - page 29 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
GECCO
2004
Springer
106views Optimization» more  GECCO 2004»
14 years 1 months ago
Evolving En-Route Caching Strategies for the Internet
Nowadays, large distributed databases are commonplace. Client applications increasingly rely on accessing objects from multiple remote hosts. The Internet itself is a huge network ...
Jürgen Branke, Pablo Funes, Frederik Thiele
INFOCOM
1996
IEEE
13 years 12 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
AVSS
2005
IEEE
14 years 1 months ago
Surveillance video for mobile devices
In this paper, we present a video encoding scheme that uses object-based adaptation to deliver surveillance video to mobile devices. The method relies on a set of complementary vi...
Olivier Steiger, Touradj Ebrahimi, Andrea Cavallar...
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
13 years 9 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 2 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...