Sciweavers

450 search results - page 37 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
ANCS
2010
ACM
14 years 7 months ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao
IWAN
1999
Springer
15 years 2 months ago
Interference and Communications among Active Network Applications
This paper focuses on active networks applications and in particular on the possible interactions among these applications. Active networking is a very promising research field wh...
Luca Delgrossi, Giuseppe Di Fatta, Domenico Ferrar...
NETWORK
2008
94views more  NETWORK 2008»
14 years 9 months ago
A Survey of Mobility Management in Hybrid Wireless Mesh Networks
Mobility management is vital for realizing large-scale wireless mesh networks to provide cost-effective broadband Internet access. Although a considerable amount of research on mo...
Jiang Xie, Xudong Wang
ENTCS
2007
131views more  ENTCS 2007»
14 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
ECUMN
2007
Springer
15 years 3 months ago
Utility-Based Bandwidth Allocation for Triple-Play Services
It is expected that, in near future, the multi-class traffic previously in Public Switched Telephone network (PSTN), cable television network and IP network will be multiplexed at...
Changbin Liu, Lei Shi, Bin Liu