Sciweavers

642 search results - page 72 / 129
» Detecting Spoofed Packets
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 10 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
IMC
2006
ACM
15 years 11 months ago
Approximate fingerprinting to accelerate pattern matching
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion d...
Ramaswamy Ramaswamy, Lukas Kencl, Gianluca Iannacc...
137
Voted
EWSN
2009
Springer
16 years 5 months ago
Experimental Study of the Impact of WLAN Interference on IEEE 802.15.4 Body Area Networks
As the number of wireless devices sharing the unlicensed 2.4 GHz ISM band increases, interference is becoming a problem of paramount importance. We experimentally investigate the e...
Jan-Hinrich Hauer, Vlado Handziski, Adam Wolisz
ICDCN
2010
Springer
15 years 11 months ago
Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh Networks
Conventional wireless networks employ a contention based channel access mechanism, which not only imposes high latency but also reduces goodput of the network. Lack of interference...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
ISCC
2008
IEEE
171views Communications» more  ISCC 2008»
15 years 11 months ago
The operation mode selection in FMIPv6
The Fast Handover for Mobile IPv6 (FMIPv6) [2] aims at reducing the long handover latency in Mobile IPv6 [1] by fast movement detection and fast binding update. Furthermore, it al...
Bin Liu, Philippe Martins, Philippe Bertin