Sciweavers

479 search results - page 74 / 96
» Lightweight Security for Network Coding
Sort
View
PDCAT
2004
Springer
15 years 5 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
CCR
2006
76views more  CCR 2006»
14 years 11 months ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
SAC
2010
ACM
15 years 6 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
RAID
2010
Springer
14 years 10 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
ISN
1999
Springer
139views Communications» more  ISN 1999»
15 years 3 months ago
Simplifying Real-Time Multimedia Application Development Using Session Descriptions
This paper presents a novel approach that simplifies real-time multimedia communication applications development and service provision. Such applications are no longer required to...
Sarom Ing, Steve Rudkin