Sciweavers

2503 search results - page 280 / 501
» Building Computer Network Attacks
Sort
View
CCS
2009
ACM
15 years 8 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
CCS
2005
ACM
15 years 7 months ago
Tracking anonymous peer-to-peer VoIP calls on the internet
Peer-to-peer VoIP calls are becoming increasingly popular due to their advantages in cost and convenience. When these calls are encrypted from end to end and anonymized by low lat...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
103
Voted
ISPAN
2005
IEEE
15 years 7 months ago
QoS-Energy aware Broadcast for Sensor Networks
We present QoS Geometric Broadcast Protocol (QoSGBP), a novel broadcasting protocol for heterogeneous wireless ad hoc and sensor networks. While broadcasting is a very energy-expe...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli
106
Voted
NCA
2003
IEEE
15 years 7 months ago
Scalable Protocol for Content-Based Routing in Overlay Networks
In content networks, messages are routed on the basis of their content and the interests (subscriptions) of the message consumers. This form of routing offers an interesting alte...
Raphaël Chand, Pascal Felber
NIPS
1997
15 years 3 months ago
Intrusion Detection with Neural Networks
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is ...
Jake Ryan, Meng-Jang Lin, Risto Miikkulainen