Sciweavers

533 search results - page 9 / 107
» Verification of Distributed Firewalls
Sort
View
CCS
2009
ACM
14 years 10 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
SRDS
2008
IEEE
14 years 4 months ago
Systematic Structural Testing of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. As the quality of protection provided by a firewall dire...
JeeHyun Hwang, Tao Xie, Fei Chen, Alex X. Liu
ICPADS
2005
IEEE
14 years 3 months ago
Embedded Fingerprint Verification System
Fingerprint verification is one of the most reliable personal identification methods in biometrics. In this paper, an effective fingerprint verification system is presented. We de...
Gwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, S...
AICCSA
2008
IEEE
301views Hardware» more  AICCSA 2008»
14 years 2 days ago
Cooperative criminal face recognition in distributed web environment
This paper presents a multi-agent framework for distributed web-based face recognition using fuzzy logic based result fusion mechanism. The model is designed in JADE framework and...
Hamid Tabatabaee Yazdi, Amin Milani Fard, Mohammad...