Sciweavers

60 search results - page 9 / 12
» VM-based Architecture for Network Monitoring and Analysis
Sort
View
SBACPAD
2003
IEEE
121views Hardware» more  SBACPAD 2003»
14 years 26 days ago
Optimizing Packet Capture on Symmetric Multiprocessing Machines
Traffic monitoring and analysis based on general purpose systems with high speed interfaces, such as Gigabit Ethernet and 10 Gigabit Ethernet, requires carefully designed software...
Gianluca Varenni, Mario Baldi, Loris Degioanni, Fu...
ICECCS
2002
IEEE
93views Hardware» more  ICECCS 2002»
14 years 17 days ago
Mnemosyne: Designing and Implementing Network Short-Term Memory
Network traffic logs play an important role in incident analysis. With the increasing throughput of network links, maintaining a complete log of all network activity has become a...
Giovanni Vigna, Andrew Mitchel
WISE
2008
Springer
14 years 2 months ago
Approximate Information Filtering in Peer-to-Peer Networks
Abstract. Most approaches to information filtering taken so far have the underlying hypothesis of potentially delivering notifications from every information producer to subscrib...
Christian Zimmer, Christos Tryfonopoulos, Klaus Be...
DSN
2006
IEEE
14 years 1 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...