Sciweavers

1845 search results - page 294 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
IPCCC
2006
IEEE
15 years 7 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
IWIA
2006
IEEE
15 years 7 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
IMC
2006
ACM
15 years 7 months ago
BGP convergence in virtual private networks
Multi-protocol label switching (MPLS) virtual private networks (VPNs) have had significant and growing commercial deployments. In this paper we present the first systematic stud...
Dan Pei, Jacobus E. van der Merwe
IWCMC
2006
ACM
15 years 7 months ago
Detecting spatial congestion in multihop wireless networks
While TCP is highly successful in the wire-line Internet, its performance fast degrades as the number of hops increases in multihop wireless networks. It is due to not only the ha...
Changhee Joo, Saewoong Bahk, Hyogon Kim
W4A
2006
ACM
15 years 7 months ago
Personalizable edge services for web accessibility
Web Content Accessibility guidelines by W3C [29] provide several suggestions for Web designers on how to author Web pages in order to make them accessible to everyone. In this con...
Gennaro Iaccarino, Delfina Malandrino, Vittorio Sc...