Sciweavers

948 search results - page 107 / 190
» Making a Game of Network Security
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 8 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
TON
2010
105views more  TON 2010»
14 years 4 months ago
Internet QoS and Regulations
This paper investigates the effects of transition from a single-service class to two-service classes in the Internet. We consider multiple competing Internet Service Providers (ISP...
Nikhil Shetty, Galina Schwartz, Jean C. Walrand
ISCAS
2006
IEEE
160views Hardware» more  ISCAS 2006»
15 years 4 months ago
Address-event image sensor network
We describe a sensor network based on smart requirements of the network. This will provide a new approach imager sensors able to extract events of interest from a scene. for compos...
Eugenio Culurciello, Andreas Savvides
ECUMN
2007
Springer
15 years 4 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
WS
2005
ACM
15 years 3 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble