Sciweavers

2507 search results - page 247 / 502
» Wireless Network Information Flow
Sort
View
126
Voted
WISEC
2010
ACM
15 years 10 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
164
Voted
MOBIDE
2009
ACM
15 years 10 months ago
MobiSNA: a mobile video social network application
This paper presents MobiSNA – a mobile video social networking application that supports the exploration, sharing, and creation of video contents through social networks. The Mo...
Liang Gou, Jung-Hyun Kim, Hung-Hsuan Chen, Jason C...
121
Voted
PERCOM
2005
ACM
16 years 3 months ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
119
Voted
MONET
2010
187views more  MONET 2010»
15 years 2 months ago
A Proxy Mobile IPv6 Based Global Mobility Management Architecture and Protocol
This paper specifies a global mobility management architecture and protocol procedure called GPMIP, which is based on Proxy Mobile IPv6. In GPMIP, mobility management is performed ...
Huachun Zhou, Hongke Zhang, Yajuan Qin, Hwang-Chen...
WORM
2004
15 years 5 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong