222
click to vote
SIGCOMM
15 years 11 months ago
2006 ACM
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
142
Voted
SIGCOMM
15 years 11 months ago
2006 ACM
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
143
click to vote
SIGCOMM
15 years 11 months ago
2006 ACM
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
148
click to vote
SIGCOMM
15 years 11 months ago
2006 ACM
Researchers have proposed a variety of metrics to measure important graph properties, for instance, in social, biological, and computer networks. Values for a particular graph met...
153
Voted
SIGCOMM
15 years 11 months ago
2006 ACM
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
|