Sciweavers

1286 search results - page 136 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
158
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Modeling temporal correlations in content fingerprints
Previous analysis of content fingerprints has mainly focused on the case of independent and identically distributed fingerprints. Practical fingerprints, however, exhibit corre...
Avinash L. Varna, Min Wu
CW
2003
IEEE
15 years 6 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
121
Voted
USS
2010
14 years 10 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
82
Voted
CONEXT
2007
ACM
15 years 4 months ago
Multipath live streaming via TCP: scheme, performance and benefits
Motivated by the wide use of TCP for streaming in practice and the increasing availability of multipath between end hosts, we study multipath live streaming via TCP in this paper....
Bing Wang, Wei Wei, Zheng Guo, Donald F. Towsley
115
Voted
ICDCSW
2005
IEEE
15 years 6 months ago
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious intrusions. Recent studies have proposed to employ the underlying principles of worm propa...
Syed A. Khayam, Hayder Radha