Sciweavers

431 search results - page 65 / 87
» Information Flows in Causal Networks
Sort
View
IWCMC
2010
ACM
15 years 3 months ago
Emulation platform for network wide traffic sampling and monitoring
It is of utmost importance for the network research community to have access to tools and testbeds to explore future directions for Internet traffic monitoring and engineering. Al...
Amir Krifa, Imed Lassoued, Chadi Barakat
FPL
2005
Springer
119views Hardware» more  FPL 2005»
15 years 7 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 1 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ISCC
2009
IEEE
250views Communications» more  ISCC 2009»
15 years 8 months ago
Access point-coordinated contention resolution for channel access in wireless LANs
MAHBOOB, AHMED M. Access Point-Coordinated Contention Resolution for Channel Access in Wireless LANs. (Under the direction of Assistant Professor Khaled A. Harfoush.) The most wid...
Ahmed M. Mahboob, Manjunath M. Prabhu, Khaled A. H...
137
Voted
DSN
2007
IEEE
15 years 5 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee