Sciweavers

26 search results - page 2 / 6
» Monitoring unauthorized internet accesses through a 'honeypo...
Sort
View
INFOCOM
1999
IEEE
15 years 1 months ago
User-Friendly Access Control for Public Network Ports
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports and wireless LANs are becoming common in public spaces inside buildings such as loung...
Guido Appenzeller, Mema Roussopoulos, Mary Baker
103
Voted
GRC
2007
IEEE
15 years 3 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
81
Voted
IMC
2007
ACM
14 years 11 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
SAINT
2005
IEEE
15 years 3 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
91
Voted
IWCMC
2010
ACM
14 years 11 months ago
Emulation platform for network wide traffic sampling and monitoring
It is of utmost importance for the network research community to have access to tools and testbeds to explore future directions for Internet traffic monitoring and engineering. Al...
Amir Krifa, Imed Lassoued, Chadi Barakat