Sciweavers

537 search results - page 29 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
NDSS
2000
IEEE
15 years 3 months ago
A Lightweight Tool for Detecting Web Server Attacks
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Magnus Almgren, Hervé Debar, Marc Dacier
ICCSA
2005
Springer
15 years 4 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
SIGCSE
2005
ACM
124views Education» more  SIGCSE 2005»
15 years 4 months ago
The virtual network system
The goal of our work is to give students a hands-on experience designing, deploying and debugging parts of the Internet infrastructure, such as an Internet router that routes real...
Martin Casado, Nick McKeown
LCN
2002
IEEE
15 years 3 months ago
Controlled Multicast Framework
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
Rami Lehtonen, Jarmo Harju
SIROCCO
2001
15 years 3 days ago
Cycle Covering
This paper considers the design of a survivable WDM network based on covering the initial network with sub-networks, which are protected independently from each other. We focus on...
Jean-Claude Bermond, Lilian Chacon, David Coudert,...