Sciweavers

290 search results - page 48 / 58
» A Scalable, Ordered Scenario-Based Network Security Simulato...
Sort
View
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 6 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
CIIT
2007
133views Communications» more  CIIT 2007»
15 years 1 months ago
Linear-tree rule structure for firewall optimization
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
Liang Zhao, A. Shimae, Hiroshi Nagamochi
CSREASAM
2004
15 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
ICON
2007
IEEE
15 years 6 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen
95
Voted
ICNP
1998
IEEE
15 years 3 months ago
Controlling Quality of Session in Adaptive Multimedia Multicast Systems
Controlling the quality of collaborative multimedia sessions, that deploy multiple media streams, is a challenging problem. In this paper, we present a framework for achieving qua...
Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly