Sciweavers

6110 search results - page 104 / 1222
» Graceful Network Operations
Sort
View
97
Voted
AINA
2006
IEEE
15 years 6 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
109
Voted
PAM
2012
Springer
13 years 8 months ago
Geolocating IP Addresses in Cellular Data Networks
Smartphones connected to cellular networks are increasingly being used to access Internet-based services. Using data collected from smartphones running a popular location-based app...
Sipat Triukose, Sebastien Ardon, Anirban Mahanti, ...
113
Voted
DSN
2009
IEEE
15 years 7 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
NCA
1998
IEEE
15 years 9 days ago
A Neural Network Model of a Communication Network with Information Servers
This paper models information flow in a communication network. The network consists of nodes that communicate with each other, and information servers that have a predominantly o...
Philippe De Wilde
82
Voted
MINENET
2005
ACM
15 years 6 months ago
Anemone: using end-systems as a rich network management platform
Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwid...
Richard Mortier, Rebecca Isaacs, Paul Barham