Sciweavers

2503 search results - page 279 / 501
» Building Computer Network Attacks
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 11 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
EUC
2004
Springer
15 years 7 months ago
On the Effects of Bandwidth Reduction Techniques in Distributed Applications
Communication optimization plays an important role in building networked distributed applications. In this paper, we systematically evaluate four bandwidth reduction algorithms, n...
Hanping Lufei, Weisong Shi, Lucia Zamorano
98
Voted
ACII
2005
Springer
15 years 7 months ago
Affective Composites: Autonomy and Proxy in Pedagogical Agent Networks
This paper proposes an alternative paradigm for building affective competencies in embodied conversational agents (ECAs). The key feature of this approach -- and the reason for ref...
Eric R. Hamilton
ICDCSW
2005
IEEE
15 years 7 months ago
Forensix: A Robust, High-Performance Reconstruction System
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
114
Voted
WISEC
2009
ACM
15 years 8 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...