Sciweavers

RAID
2001
Springer
14 years 4 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
RAID
2001
Springer
14 years 4 months ago
From Declarative Signatures to Misuse IDS
Jean-Philippe Pouzol, Mireille Ducassé
QOSIP
2001
Springer
14 years 4 months ago
Quality of Service Issues in Multi-service Wireless Internet Links
—Internet application performance over wireless links is disappointing, due to wireless impairments and their adverse interactions with higher protocol layers. In order to effect...
George Xylomenos, George C. Polyzos
QOSIP
2001
Springer
14 years 4 months ago
Router Architectures Exploiting Input-Queued Cell-Based Switching Fabrics
Marco Ajmone Marsan, Andrea Bianco, Paolo Giaccone...
QOSIP
2001
Springer
14 years 4 months ago
An Upper Bound to the Loss Probability in the Multiplexing of Jittered Flows
Marco Listanti, Fabio Ricciato, Stefano Salsano
POLICY
2001
Springer
14 years 4 months ago
Policy Based SLA Management in Enterprise Networks
The Differentiated Services Architecture defines the mechanisms that are needed to offer multiple classes of services in an IP network. While this model offers significant scaling ...
Dinesh C. Verma, Mandis Beigi, Raymond B. Jennings...
POLICY
2001
Springer
14 years 4 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
POLICY
2001
Springer
14 years 4 months ago
On Policy-Based Extensible Hierarchical Network Management in QoS-Enabled IP Networks
Paris Flegkas, Panos Trimintzios, George Pavlou, I...
POLICY
2001
Springer
14 years 4 months ago
Taxonomy and Description of Policy Combination Methods
To control complicated and decomposable networking functions, such as Diffserv, two or more policies must cooperate. Combining two or more mutually dependent policies for a specifi...
Yasusi Kanada