Sciweavers

450 search results - page 16 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
CNSM
2010
14 years 7 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood
ICECCS
2009
IEEE
129views Hardware» more  ICECCS 2009»
15 years 4 months ago
CONNECT Challenges: Towards Emergent Connectors for Eternal Networked Systems
—The CONNECT European project that started in February 2009 aims at dropping the interoperability barrier faced by today’s distributed systems. It does so by adopting a revolut...
Valérie Issarny, Bernhard Steffen, Bengt Jo...
97
Voted
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CBMS
2007
IEEE
15 years 4 months ago
Switched Lightpaths for e-Health Applications: Issues and Challenges
The Exploitation of Switched Lightpaths for e-Science Applications (ESLEA) project is evaluating the feasibility of using switched lightpath networks to support various e-Science ...
Lee Momtahan, Sharon Lloyd, Andrew Simpson
97
Voted
SECON
2007
IEEE
15 years 3 months ago
Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization
Abstract—Although the characteristics of RF transmissions are physically well understood at the lowest levels of communication design, accurately incorporating power and interfer...
Steven Myers, Seapahn Megerian, Suman Banerjee, Mi...