Sciweavers

1123 search results - page 85 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
ICECCS
2009
IEEE
129views Hardware» more  ICECCS 2009»
15 years 10 months ago
CONNECT Challenges: Towards Emergent Connectors for Eternal Networked Systems
—The CONNECT European project that started in February 2009 aims at dropping the interoperability barrier faced by today’s distributed systems. It does so by adopting a revolut...
Valérie Issarny, Bernhard Steffen, Bengt Jo...
SERSCISA
2009
Springer
15 years 10 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...
INFOCOM
2011
IEEE
14 years 7 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
ISCC
2008
IEEE
122views Communications» more  ISCC 2008»
15 years 10 months ago
A flexible network monitoring tool based on a data stream management system
Network monitoring is a complex task that generally requires the use of different tools for specific purposes. This paper describes a flexible network monitoring tool, called Pa...
Natascha Petry Ligocki, Carmem S. Hara, Christiano...
INFOCOM
2011
IEEE
14 years 7 months ago
Ubiquitous data collection for mobile users in wireless sensor networks
Abstract—We study the ubiquitous data collection for mobile users in wireless sensor networks. People with handheld devices can easily interact with the network and collect data....
Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao