Sciweavers

669 search results - page 46 / 134
» Architecture of a Network Monitoring Element
Sort
View
CN
2007
179views more  CN 2007»
14 years 12 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CODES
2003
IEEE
15 years 5 months ago
A modular simulation framework for architectural exploration of on-chip interconnection networks
Ever increasing complexity and heterogeneity of SoC platforms require diversified on-chip communication schemes beyond the currently omnipresent shared bus architectures. To prev...
Tim Kogel, Malte Doerper, Andreas Wieferink, Raine...
WIMOB
2008
IEEE
15 years 6 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 5 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
E2EMON
2006
IEEE
15 years 6 months ago
Active Probing Approach for Fault Localization in Computer Networks
—Active probing is an active network monitoring technique that has potential for developing effective solutions for fault localization. In this paper we use active probing to pre...
Maitreya Natu, Adarshpal S. Sethi