Sciweavers

4262 search results - page 208 / 853
» Internet and Intranet Computing
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
OTM
2005
Springer
15 years 9 months ago
Personalising Context-Aware Applications
The immaturity of the field of context-aware computing means that little is known about how to incorporate appropriate personalisation mechanisms into context-aware applications. ...
Karen Henricksen, Jadwiga Indulska
NDSS
1997
IEEE
15 years 8 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
CONEXT
2007
ACM
15 years 8 months ago
A quicker way to discover nearby peers
The match between a peer-to-peer overlay and the physical Internet infrastructure is a constant issue. Time-constrained peer-to-peer applications such as live streaming systems ar...
Gwendal Simon, Yiping Chen, Ali Boudani
CONEXT
2007
ACM
15 years 8 months ago
Application and desktop sharing
Application and desktop sharing allows sharing any application with one or more people over the Internet. The participants receive the screen-view of the shared application from t...
Omer Boyaci, Henning Schulzrinne