Sciweavers

8080 search results - page 1595 / 1616
» From Computer Networks to Agent Networks
Sort
View
NOMS
2008
IEEE
15 years 4 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 4 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
CSFW
2007
IEEE
15 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
101
Voted
ISCAS
2007
IEEE
161views Hardware» more  ISCAS 2007»
15 years 4 months ago
Hardware Architecture of a Parallel Pattern Matching Engine
Abstract— Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. This proc...
Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franz...
SMC
2007
IEEE
102views Control Systems» more  SMC 2007»
15 years 4 months ago
TagFree: Identifying users without tags in smart home environments
— Since family members have their unique features when living in a smart home environment, user identifications are able to achieve without any tags. In this paper, we propose T...
Wen-Chih Peng, Wangling Huang, YiLing Chen, PeiChi...
« Prev « First page 1595 / 1616 Last » Next »