111
click to vote
SIGCOMM
15 years 2 months ago
2006 ACM
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
SIGCOMM
15 years 2 months ago
2006 ACM
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
SIGCOMM
15 years 2 months ago
2006 ACM
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
85
Voted
SIGCOMM
15 years 2 months ago
2006 ACM
Researchers have proposed a variety of metrics to measure important graph properties, for instance, in social, biological, and computer networks. Values for a particular graph met...
86
Voted
SIGCOMM
15 years 2 months ago
2006 ACM
In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dyna...
|