Sciweavers

741 search results - page 131 / 149
» Verification of security protocols using LOTOS-method and ap...
Sort
View
EIT
2008
IEEE
14 years 1 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
IEEEARES
2008
IEEE
14 years 1 months ago
Rapid Detection of Constant-Packet-Rate Flows
—The demand for effective VoIP and online gaming traffic management methods continues to increase for purposes such as QoS provisioning, usage accounting, and blocking VoIP call...
Kuan-Ta Chen, Jing-Kai Lou
PDPTA
2008
13 years 9 months ago
A GridFTP Transport Driver for Globus XIO
GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for highp...
Rajkumar Kettimuthu, Wantao Liu, Joseph M. Link, J...
CAINE
2008
13 years 9 months ago
Towards Multiservice Sensor Networks
Sensor networks have been used in many applications such as health monitoring, structural monitoring, transportation networks, weather prediction, and border security. In most of ...
Rabie Ramadan, Bilal I. AlQudah
USS
2010
13 years 5 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...