Sciweavers

2503 search results - page 104 / 501
» Building Computer Network Attacks
Sort
View
MOBIHOC
2005
ACM
15 years 9 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
ICPP
2003
IEEE
15 years 3 months ago
Exploiting Client Caches: An Approach to Building Large Web Caches
New demands brought by the continuing growth of the Internet will be met in part by more effective and comprehensive use of caching. This paper proposes to exploit client browser ...
Yingwu Zhu, Yiming Hu
WETICE
2003
IEEE
15 years 3 months ago
DEVISE: A Methodology for Building Web Services Based Infrastructure for Collaborative Enterprises
Web Services define a new paradigm in present-day collaborative application development in enterprises, and span systems, networks, and organizations. Emerging computing infrastru...
N. Dhyanesh, G. C. Vineel, S. V. Raghavan
GIS
2007
ACM
15 years 4 months ago
Cell-based generalization of 3D building groups with outlier management
In this paper, we present a technique that generalizes 3D building groups of virtual 3D city models according to a cell structure that is derived from infrastructure networks. In ...
Tassilo Glander, Jürgen Döllner
CCS
2003
ACM
15 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson