Sciweavers

450 search results - page 30 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
SIGCOMM
2004
ACM
15 years 3 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
HICSS
2007
IEEE
136views Biometrics» more  HICSS 2007»
15 years 4 months ago
Exploring the Adoption, Utility, and Social Influences of Social Bookmarking in a Corporate Environment
This paper describes an ongoing technology investigation to assess the value and utility of social bookmarking on a corporate intranet. We hypothesize that social bookmarking woul...
Laurie E. Damianos, Donna L. Cuomo, John Griffith,...
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ICNS
2007
IEEE
15 years 4 months ago
IGMPS, a New Tool for Estimating End-to-End Available Bandwidth in IP Network Paths
— This paper presents a new end-to-end available bandwidth measurement tool called IGMPS (Improved Gap Model using Packet Size parameter). IGMPS is a lightweight tool based on a ...
Ahmed Ait Ali, Francis Lepage
ANCS
2006
ACM
15 years 1 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo