Sciweavers

141 search results - page 3 / 29
» Intrusion Tolerance in Wireless Environments: An Experimenta...
Sort
View
SEC
2008
13 years 6 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
DSN
2005
IEEE
13 years 11 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
LCN
2006
IEEE
13 years 11 months ago
Experimental and Analytical Evaluation of Available Bandwidth Estimation Tools
In this paper, we present a low cost and flexible testbed to evaluate the performance of available bandwidth estimation tools in a common and controlled environment. In addition,...
Cesar D. Guerrero, Miguel A. Labrador
MOBICOM
2004
ACM
13 years 10 months ago
Performance optimizations for wireless wide-area networks: comparative study and experimental evaluation
We present a comparative performance study of a wide selection of optimization techniques to enhance application performance in the context of wide-area wireless networks (WWANs)....
Rajiv Chakravorty, Suman Banerjee, Pablo Rodriguez...
MASCOTS
2004
13 years 6 months ago
Experimental Evaluation of TCP Performance in Multi-Hop Wireless Ad Hoc Networks
This paper presents experimental measurements of TCP bulk data transfer performance in a multi-hop wireless ad hoc network environment. The first part of the paper studies how TCP...
Abhinav Gupta, Ian Wormsbecker, Carey L. Williamso...