We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
With the advent of mobile computing and mobile services becoming more widespread and more complex, the development process of those services requires an ever more important focus o...
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc netw...
Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalCha...
Internet is widely known for lacking any kind of mechanism for the provisioning of Quality of Service guarantees. The Internet community concentrates its efforts on the Bandwidth ...
George A. Politis, Petros Sampatakos, Iakovos S. V...
Improving IP control plane (routing) robustness is critical to the creation of reliable and stable IP services. Yet very few tools exist for effective IP route monitoring and mana...