Sciweavers

1123 search results - page 53 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
15 years 6 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...
WCNC
2008
IEEE
15 years 6 months ago
An Uplink Medium Access Protocol with SDMA Support for Multiple-Antenna WLANs
— In this paper, we propose a contention based uplink Medium Access Control (MAC) protocol design for Wireless Local Area Networks (WLANs) with Spatial Division Multiple Access (...
Sheng Zhou, Zhisheng Niu
WMCSA
1999
IEEE
15 years 4 months ago
An Adaptive Protocol for Reliable Multicast in Mobile Multi-hop Radio Networks
In this paper we propose a new protocol for reliable multicast in a multi-hop mobile radio network. The protocol is reliable, i.e., it guarantees message delivery to all multicast...
Sandeep K. S. Gupta, Pradip K. Srimani
ISOLA
2010
Springer
14 years 10 months ago
Towards a Connector Algebra
Interoperability of heterogeneous networked systems has yet to reach the maturity required by ubiquitous computing due to the technology-dependent nature of solutions. The Connect ...
Marco Autili, Chris Chilton, Paola Inverardi, Mart...
ACSAC
2005
IEEE
15 years 5 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop