Sciweavers

6110 search results - page 104 / 1222
» Graceful Network Operations
Sort
View
AINA
2006
IEEE
15 years 10 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
137
Voted
PAM
2012
Springer
13 years 11 months ago
Geolocating IP Addresses in Cellular Data Networks
Smartphones connected to cellular networks are increasingly being used to access Internet-based services. Using data collected from smartphones running a popular location-based app...
Sipat Triukose, Sebastien Ardon, Anirban Mahanti, ...
138
Voted
DSN
2009
IEEE
15 years 10 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
NCA
1998
IEEE
15 years 3 months ago
A Neural Network Model of a Communication Network with Information Servers
This paper models information flow in a communication network. The network consists of nodes that communicate with each other, and information servers that have a predominantly o...
Philippe De Wilde
MINENET
2005
ACM
15 years 9 months ago
Anemone: using end-systems as a rich network management platform
Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwid...
Richard Mortier, Rebecca Isaacs, Paul Barham