Sciweavers

1123 search results - page 38 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ACSC
2008
IEEE
15 years 6 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney
PDCN
2004
15 years 1 months ago
Design and implementation of a network simulation system
In this paper, an efficient tool has been designed and implemented to design and analyze the communication networks. A network simulator in software is valuable for network manage...
Jae-Weon Choi, Man-Hui Lee
ACSAC
1998
IEEE
15 years 4 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
CCS
2005
ACM
15 years 5 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
ICWN
2003
15 years 1 months ago
Energy-Efficient Bootstrapping Protocol for Sensor Networks
Sensor networks are poised for increasingly wider uses in many military and civil applications. We present a bootstrapping protocol for a class of sensor networks in which the net...
Rajesh Mathew, Mohamed F. Younis