Sciweavers

1123 search results - page 25 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
CN
2004
109views more  CN 2004»
14 years 11 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
ICDCSW
2000
IEEE
15 years 3 months ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen
APNOMS
2007
Springer
15 years 6 months ago
A Self-managing SIP-Based IP Telephony System Based on a P2P Approach Using Kademlia
Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
RAID
2004
Springer
15 years 5 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
TJS
2002
118views more  TJS 2002»
14 years 11 months ago
On the Design, Development, Deployment, and Network Survivability Analysis of the Dynamic Routing System Protocol
: With the ever-increasing demands on server applications, reliability is of paramount importance. Often these services are implemented using a distributed server cluster architect...
Abdur Chowdhury, Ophir Frieder, Peng-Jun Wan