Sciweavers

51 search results - page 7 / 11
» Generic Application-Level Protocol Analyzer and its Language
Sort
View
WSC
2007
15 years 1 months ago
A metamodel-based representation method for reusable simulation model
The composition and reuse of simulation model is currently a hot research topic in the area of complex system modeling and simulation. A unified simulation model representation is...
Yonglin Lei, Lili Song, Weiping Wang 0002, Caiyun ...
APLAS
2010
ACM
14 years 11 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 6 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
GLOBECOM
2009
IEEE
15 years 6 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
15 years 5 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signiï...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...