Sciweavers

WISEC
2010
ACM
14 years 6 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
MOBISYS
2006
ACM
14 years 11 months ago
Using smart triggers for improved user performance in 802.11 wireless networks
The handoff algorithms in the current generation of 802.11 networks are primarily reactive in nature, because they wait until the link quality degrades substantially to trigger a ...
Vivek Mhatre, Konstantina Papagiannaki