Sciweavers

450 search results - page 59 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
ASUNAM
2011
IEEE
13 years 9 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos
ACSAC
2004
IEEE
15 years 1 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
PERCOM
2006
ACM
15 years 9 months ago
Concept for Hierarchical and Distributed Processing of Area Based Triggers
Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new ...
Sven D. Hermann, Günter Schäfer, Adam Wo...
EIT
2008
IEEE
15 years 4 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
INFOCOM
2007
IEEE
15 years 4 months ago
Exploring VoD in P2P Swarming Systems
Abstract—Digital media companies have recently started embracing P2P networks as an alternative distribution mechanism. However, with current P2P swarming systems users need to d...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...