Sciweavers

450 search results - page 40 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
IFIP8
2004
14 years 11 months ago
Using Group Management to Tame Mobile Ad Hoc Networks
Mobile ad hoc networks (MANET) offer a convenient basis towards pervasive computing, due to inherent support for anytime, anywhere network access for mobile users. However, the dev...
Malika Boulkenafed, Daniele Sacchetti, Valé...
INFOCOM
2012
IEEE
13 years 6 days ago
Maximizing system throughput by cooperative sensing in Cognitive Radio Networks
—Cognitive Radio Networks allow unlicensed users to opportunistically access the licensed spectrum without causing disruptive interference to the primary users (PUs). One of the ...
Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shro...
INFOCOM
2007
IEEE
15 years 4 months ago
Measuring Network-Aware Worm Spreading Ability
— This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vuln...
Zesheng Chen, Chuanyi Ji
FSKD
2006
Springer
127views Fuzzy Logic» more  FSKD 2006»
15 years 1 months ago
On the Society of Genome: Social Affiliation Network Analysis of Microarray Data
Abstract. To investigate the structure of the genomic interaction network built from yeast gene-expression compendium dataset of hundreds of systematic perturbations, social affili...
Jung Hun Ohn, Jihoon Kim, Ju Han Kim
ISCC
2006
IEEE
147views Communications» more  ISCC 2006»
15 years 3 months ago
An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony
Deploying IP telephony or voice over IP (VoIP) is a major and challenging task. This paper describes an analytical approach and tool to assess the readiness of existing IP network...
Khaled Salah, M. Almashari