Sciweavers

7544 search results - page 153 / 1509
» Network Forensics Analysis
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 5 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
139
Voted
CONCURRENCY
2010
104views more  CONCURRENCY 2010»
15 years 3 months ago
Performance analysis of an experimental wireless relay sensor network
Communication through relay channels in wireless sensor networks can create diversity and consequently improve robustness of data transmission for ubiquitous computing and network...
Gu-Chun Zhang, Xiao-Hong Peng, Xuan-Ye Gu
136
Voted
TON
2008
149views more  TON 2008»
15 years 3 months ago
Building heterogeneous peer-to-peer networks: protocol and analysis
In this paper, we propose a simple protocol for building heterogeneous unstructured peer-to-peer (P2P) networks. The protocol consists of two parts--the joining process and the reb...
Kin Wah Kwong, Danny H. K. Tsang
156
Voted
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 3 months ago
Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis
Abstract--Study on human mobility is gaining increasing attention from the research community with its multiple applications to use in mobile networks, particularly for the purpose...
Sungwook Moon, Ahmed Helmy
PERCOM
2010
ACM
15 years 1 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik