Sciweavers

642 search results - page 112 / 129
» Detecting Spoofed Packets
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 6 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
HOTI
2008
IEEE
15 years 6 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
ICC
2008
IEEE
168views Communications» more  ICC 2008»
15 years 6 months ago
Topology Control for Reliable Sensor-to-Sink Data Transport in Sensor Networks
— Wireless Sensor Networks (WSNs) are generally used for harsh environments involving military surveillance, emergency response, and habitat monitoring. Due to severe resource co...
Jiong Wang, Sirisha Medidi
ICCCN
2008
IEEE
15 years 6 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
INFOCOM
2008
IEEE
15 years 6 months ago
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks
This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for UWSN fac...
Affan A. Syed, Wei Ye, John S. Heidemann