Sciweavers

CNSM
2010
13 years 9 months ago
A performance view on DNSSEC migration
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term solution to mitigate this attack. A lot of technical docum...
Daniel Migault, Cedric Girard, Maryline Laurent
CNSM
2010
13 years 9 months ago
Facing the unpredictable: Automated adaption of IT change plans for unpredictable management domains
Abstract--Change Management, a core process of the Information Technology Infrastructure Library (ITIL), is concerned with the management of changes to IT infrastructure and servic...
Sebastian Hagen, Alfons Kemper
CNSM
2010
13 years 9 months ago
MANET network management and performance monitoring for NHDP and OLSRv2
Abstract--Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely "un-managed" network deployments, capable of accommodating highly dyn...
Ulrich Herberg, Thomas Clausen, Robert Cole
CNSM
2010
13 years 9 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood