Sciweavers

4262 search results - page 595 / 853
» Internet and Intranet Computing
Sort
View
ISCC
2005
IEEE
105views Communications» more  ISCC 2005»
15 years 10 months ago
The Bandwidth Exchange Architecture
New applications for the Internet such as video on demand, grid computing etc. depend on the availability of high bandwidth connections with acceptable Quality of Service (QoS). T...
David Michael Turner, Vassilis Prevelakis, Angelos...
146
Voted
LCN
2005
IEEE
15 years 10 months ago
Automated Traffic Classification and Application Identification using Machine Learning
The dynamic classification and identification of network applications responsible for network traffic flows offers substantial benefits to a number of key areas in IP network engi...
Sebastian Zander, Thuy T. T. Nguyen, Grenville J. ...
NDSS
2005
IEEE
15 years 10 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
157
Voted
NDSS
2005
IEEE
15 years 10 months ago
Pretty Secure BGP, psBGP
The Border Gateway Protocol (BGP) is an IETF standard inter-domain routing protocol on the Internet. However, it is well known that BGP is vulnerable to a variety of attacks, and ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
142
Voted
NDSS
2005
IEEE
15 years 10 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...