The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
The increasing proliferation of online shopping and purchasing has naturally led to a growth in the popularity of comparisonshopping search engines, popularly known as "shopb...
Robert S. Garfinkel, Ram D. Gopal, Arvind K. Tripa...
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
With reference to the General Packet Radio Service (GPRS), an extension of the Global System Mobile Communication (GSM) addressing packetoriented traffic, this paper contributes t...
Stefano Porcarelli, Felicita Di Giandomenico, Andr...
Abstract. In wireless ad hoc networks, cross-layer design aims at reducing multiple access interference and thus obtaining a higher spatial reuse. In order to identify the most sui...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...