Sciweavers

1358 search results - page 267 / 272
» Diverse Firewall Design
Sort
View
ACSAC
2010
IEEE
14 years 9 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
GLOBECOM
2010
IEEE
14 years 9 months ago
Space-Time Shift Keying: A Unified MIMO Architecture
In this paper, we propose a novel Space-Time Shift Keying (STSK) modulation scheme for MIMO communication systems, where the concept of spatial modulation is extended to include bo...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
ICWS
2010
IEEE
14 years 9 months ago
An Approach for Context-Aware Service Discovery and Recommendation
Given the large amount of existing services and the diversified needs nowadays, it is time-consuming for end-users to find appropriate services. To help end-users obtain their desi...
Hua Xiao, Ying Zou, Joanna Ng, Leho Nigul
IMC
2010
ACM
14 years 9 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
IMC
2010
ACM
14 years 9 months ago
Primitives for active internet topology mapping: toward high-frequency characterization
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from ex...
Robert Beverly, Arthur Berger, Geoffrey G. Xie