Sciweavers

450 search results - page 18 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
DEXAW
2006
IEEE
179views Database» more  DEXAW 2006»
15 years 3 months ago
Opportunistic Networks: Challenges in Specializing the P2P Paradigm
We introduce the notion of opportunistic networks or oppnets, some of which can be considered a subclass of the peer-to-peer (P2P) networks. Initially, a relatively small seed opp...
Leszek Lilien, Zille Huma Kamal, Ajay K. Gupta
IJNSEC
2008
210views more  IJNSEC 2008»
14 years 9 months ago
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
One of the biggest challenges facing digital investigators is the sheer volume of data that must be searched in locating the digital evidence. How to efficiently locate the eviden...
Zaiqiang Liu, Dongdai Lin, Fengdeng Guo
ICC
2009
IEEE
171views Communications» more  ICC 2009»
14 years 7 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 3 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
ICDCSW
2003
IEEE
15 years 3 months ago
Toward a Security Architecture for Smart Messages: Challenges, Solutions, and Open Issues
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs ar...
Gang Xu, Cristian Borcea, Liviu Iftode