Sciweavers

1055 search results - page 174 / 211
» Performance Analysis of Generalized Multihop Shuffle Network...
Sort
View
CCS
2003
ACM
15 years 5 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
TII
2008
169views more  TII 2008»
14 years 11 months ago
Fine-Tuning MAC-Level Protocols for Optimized Real-Time QoS
In distributed real-time systems, meeting the real-time constraints is mandatory but the satisfaction of other application-dependent criteria is most generally required as well. I...
Mathieu Grenier, Nicolas Navet
ICRA
2009
IEEE
144views Robotics» more  ICRA 2009»
15 years 6 months ago
Reusable electronics and adaptable communication as implemented in the odin modular robot
Abstract— This paper describes the electronics and communication system of Odin, a novel heterogeneous modular robot made of links and joints. The electronics is divided into two...
Ricardo Franco Mendoza Garcia, Andreas Lyder, Davi...
EUROSYS
2008
ACM
15 years 9 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ESAS
2007
Springer
15 years 6 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...