—We present in this paper SGNET, a distributed framework to collect information on Internet attacks, with special attention to self-propagating malware and code injections. This ...
In 3G-WLAN overlay network environments, a UE is apt to lose the WLAN signal without any notice by moving while it connects to WLAN because it can be apart from the WLAN coverage s...
Hyeyeon Kwon, Mijeong Yang, Aesoon Park, S. Venkat...
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Large complex systems (such as Enterprise systems) are often composed of several interacting, independent components. In many such systems, although the behavior of the constituen...
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
We present SPIRIT, a Service for Providing Infrastructure Recommendations for Information Technology. SPIRIT allows maintenance support providers for Small-to-Medium Businesses (S...
—Storage Area Networks (SANs) connect storage devices to servers over fast network interconnects. We consider the problem of optimal SAN configuration with the goal of meeting s...
Abstract—The security mechanisms employed in current networked environments are increasingly complex, and their configuration management has an important role for the protection...
— Wireless networks have become a ubiquitous reality and ever more surround our everyday activities. They form and disappear around us spontaneously and have become new means for...
—Increasingly there is a demand for more scalable fault management schemes to cope with the ever increasing growth and complexity of modern networks. Current distributed fault co...