Sciweavers

598 search results - page 106 / 120
» Aspect-Oriented Development Using Protocol Modeling
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 3 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CCS
2003
ACM
15 years 4 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 6 months ago
IEEE 802.11-Based Mobile IP Fast Handoff Latency Analysis
— Mobile IP is a solution for mobility support in the global Internet. However, it suffers from long handoff delay. Many solutions have been proposed to reduce the handoff delay ...
Jiang Xie, Ivan Howitt, Izzeldin Shibeika
ANCS
2011
ACM
13 years 11 months ago
ReClick - A Modular Dataplane Design Framework for FPGA-Based Network Virtualization
Network virtualization has emerged as a powerful technique to deploy novel services and experimental protocols over shared network infrastructures. Although recent research has hi...
Deepak Unnikrishnan, Justin Lu, Lixin Gao, Russell...
WWW
2003
ACM
16 years 10 days ago
Integrating Adaptive Hypermedia Techniques and Open RDF-based Environments
The World Wide Web has not only revolutionized the area of traditional hypermedia, it is also starting to influence adaptive hypermedia research. The main feature of the World Wid...
Peter Dolog, Rita Gavriloaie, Wolfgang Nejdl, Jan ...