194
click to vote
SIGCOMM
15 years 8 months ago
2006 ACM
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
120
click to vote
SIGCOMM
15 years 8 months ago
2006 ACM
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
115
click to vote
SIGCOMM
15 years 8 months ago
2006 ACM
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
128
click to vote
SIGCOMM
15 years 8 months ago
2006 ACM
Researchers have proposed a variety of metrics to measure important graph properties, for instance, in social, biological, and computer networks. Values for a particular graph met...
134
click to vote
SIGCOMM
15 years 8 months ago
2006 ACM
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
|