Sciweavers

4263 search results - page 611 / 853
» Network Security
Sort
View
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 11 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
PAM
2010
Springer
15 years 11 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
124
Voted
ICIP
2001
IEEE
16 years 6 months ago
Use of neural networks for behaviour understanding in railway transport monitoring applications
In the last years, the interest for advanced video-based surveillance applications is more and more growing. This is especially true in the field of railway urban transport where ...
Claudio Sacchi, Carlo S. Regazzoni, Gianluca Gera,...
ICRA
2005
IEEE
166views Robotics» more  ICRA 2005»
15 years 10 months ago
Bilateral Teleoperation of Multiple Cooperative Robots over Delayed Communication Networks: Theory
Abstract— We propose a control framework for the bilateral teleoperation between a single master robot and multiple cooperative slave robots with communication-delay in the maste...
Dongjun Lee, Mark W. Spong
WPES
2003
ACM
15 years 9 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...