Sciweavers

2503 search results - page 192 / 501
» Building Computer Network Attacks
Sort
View
CCR
2008
79views more  CCR 2008»
15 years 2 months ago
CRAWDAD workshop 2007
Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource f...
Jihwang Yeo, Tristan Henderson, David Kotz
AIMS
2008
Springer
15 years 8 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
DSOM
2006
Springer
15 years 5 months ago
CMDB - Yet Another MIB? On Reusing Management Model Concepts in ITIL Configuration Management
According to ITIL, a CMDB (Configuration Management Database), containing a logical model of the IT infrastructure, forms the basis for effective and efficient IT Service Managemen...
Michael Brenner, Markus Garschhammer, Martin Saile...
CONEXT
2010
ACM
14 years 12 months ago
Scalable routing on flat names
We introduce a protocol which routes on flat, locationindependent identifiers with guaranteed scalability and low stretch. Our design builds on theoretical advances in the area of...
Ankit Singla, Brighten Godfrey, Kevin R. Fall, Gia...
RAID
2009
Springer
15 years 8 months ago
Brave New World: Pervasive Insecurity of Embedded Network Devices
Abstract. Embedded network devices have become an ubiquitous fixture in the modern home, office as well as in the global communication infrastructure. Devices like routers, NAS ap...
Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore ...